Sciweavers

659 search results - page 4 / 132
» Compiling and securing cryptographic protocols
Sort
View
85
Voted
CSFW
2009
IEEE
15 years 6 months ago
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists
Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. ...
Najah Chridi, Mathieu Turuani, Michaël Rusino...
114
Voted
CSFW
1999
IEEE
15 years 4 months ago
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief
Belief-logic deductions are used in the analysis of cryptographic protocols. We show a new method to decide such logics. In addition to the familiar BAN logic, it is also applicab...
David Monniaux
FSTTCS
2003
Springer
15 years 4 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
IWSEC
2007
Springer
15 years 5 months ago
On Security Models and Compilers for Group Key Exchange Protocols
Emmanuel Bresson, Mark Manulis, Jörg Schwenk