Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,854,006 papers from all fields of science
Search
Sign In
Create Free Account
CryptoVerif
CryptoVerif is a software tool for the automatic reasoning about security protocols written by Bruno Blanchet. Contrary to ProVerif by the same…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
6 relations
Authentication
Concrete security
Cryptographic primitive
Cryptographic protocol
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation
David Butler
,
D. Aspinall
,
Adrià Gascón
ITP
2017
Corpus ID: 215824311
In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a function jointly while keeping…
Expand
2017
2017
Explorer How to Simulate It in Isabelle : Towards Formal Proof for Secure Multi-Party Computation
David Butler
,
D. Aspinall
,
Adrià Gascón
2017
Corpus ID: 6643530
In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a function jointly while keeping…
Expand
2015
2015
A Mechanized Proof of Security for Searchable Symmetric Encryption
Adam Petcher
,
J. G. Morrisett
IEEE 28th Computer Security Foundations Symposium
2015
Corpus ID: 10474170
We present a mechanized proof of security for an efficient Searchable Symmetric Encryption (SSE) scheme completed in the…
Expand
2015
2015
A Framework for Analyzing Verifiability in Traditional and Electronic Exams
Jannik Dreier
,
Rosario Giustolisi
,
Ali Kassem
,
P. Lafourcade
,
G. Lenzini
ISPEC
2015
Corpus ID: 15218725
The main concern for institutions that organize exams is to detect when students cheat. Actually more frauds are possible and…
Expand
Review
2012
Review
2012
Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif
Bo Meng
,
Wei Wang
,
Wei Chen
J. Comput.
2012
Corpus ID: 6201713
Owning to the damage of denial of service attacks in security protocols, resistance of denial of service attacks plays an…
Expand
2012
2012
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
Joe-Kai Tsay
,
S. F. Mjølsnes
MMM-ACNS
2012
Corpus ID: 18299141
We report on a deficiency in the specifications of the Authentication and Key Agreement (AKA) protocols of the Universal Mobile…
Expand
2011
2011
Computer Aided Verification of Accountability in Electronic Payment Protocol with CryptoVerif
Bo Meng
2011
Corpus ID: 17452273
During the past few decades electronic payment protocols has been studied. A lot of electronic payment protocols, for example…
Expand
2010
2010
The computational and decisional Diffie-Hellman assumptions in CryptoVerif
B. Blanchet
,
D. Pointcheval
2010
Corpus ID: 59922823
We present an extension of CryptoVerif to Diffie-Hellman key agreements. CryptoVerif [1] is a security protocol verifier sound in…
Expand
Highly Cited
2009
Highly Cited
2009
Models and Proofs of Protocol Security: A Progress Report
M. Abadi
,
B. Blanchet
,
Hubert Comon-Lundh
CAV
2009
Corpus ID: 16648884
This paper discusses progress in the verification of security protocols. Focusing on a small, classic example, it stresses the…
Expand
2007
2007
CryptoVerif: A Computationally Sound Mechanized Prover for Cryptographic Protocols
B. Blanchet
2007
Corpus ID: 64566608
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE