How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones

@inproceedings{ComonLundh2011HowTP,
  title={How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones},
  author={Hubert Comon-Lundh and V{\'e}ronique Cortier},
  booktitle={STACS},
  year={2011}
}
Security protocols are short programs that aim at securing communication over a public network. Their design is known to be error-prone with flaws found years later. That is why they deserve a careful security analysis, with rigorous proofs. Two main lines of research have been (independently) developed to analyse the security of protocols. On the one hand, formal methods provide with symbolic models and often automatic proofs. On the other hand, cryptographic models propose a tighter modeling… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-10 of 16 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 44 references

Similar Papers

Loading similar papers…