Sciweavers

Share
209 search results - page 1 / 42
» A survey of algebraic properties used in cryptographic proto...
Sort
View
JCS
2006
91views more  JCS 2006»
9 years 2 months ago
A survey of algebraic properties used in cryptographic protocols
Abstract: Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that ...
Véronique Cortier, Stéphanie Delaune...
LPAR
2005
Springer
9 years 7 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however diļ¬ƒcult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...
CORR
2010
Springer
151views Education» more  CORR 2010»
9 years 2 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
CN
2006
117views more  CN 2006»
9 years 2 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance
IWFM
2003
9 years 3 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
books