Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,436,969 papers from all fields of science
Search
Sign In
Create Free Account
CryptoVerif
CryptoVerif is a software tool for the automatic reasoning about security protocols written by Bruno Blanchet. Contrary to ProVerif by the same…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Authentication
Concrete security
Cryptographic primitive
Cryptographic protocol
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Explorer How to Simulate It in Isabelle : Towards Formal Proof for Secure Multi-Party Computation
D. Butler
,
David Aspinall
,
Adrià Gascón
2017
Corpus ID: 6643530
In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a function jointly while keeping…
Expand
2016
2016
Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers
Collins Mtita
,
M. Laurent-Maknavicius
,
Jacques Delort
IET Information Security
2016
Corpus ID: 28562909
Radio-frequency identification (RFID) technology's potential relies on advances made by researchers for addressing the technology…
Expand
2016
2016
Lightweight serverless protocols for the internet of things. (Les protocoles de sécurité serverless légers pour l'internet des objets)
Collins Mtita
2016
Corpus ID: 29303789
This thesis addresses the security and privacy challenges relevant to the resource constrained devices in the era of pervasive…
Expand
2013
2013
Formal Verification of Voting and Auction Protocols : From Privacy to Fairness and Verifiability
Jannik Dreier
2013
Corpus ID: 167157938
In this document, we formally analyze security in electronic voting and electronic auctions. On-line voting over is now available…
Expand
2013
2013
Routage sécurisé et résilient pour réseaux de capteurs sans fil
K. Altisen
,
Stéphane Devismes
,
Raphaëlle Jamet
,
P. Lafourcade
2013
Corpus ID: 193802956
Nous proposons un algorithme resilient et securise pour le routage dans les reseaux de capteurs sans fil. Il garantit la…
Expand
Review
2012
Review
2012
Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif
Bo Meng
,
Wei Wang
,
Wei Chen
Journal of Computers
2012
Corpus ID: 6201713
Owning to the damage of denial of service attacks in security protocols, resistance of denial of service attacks plays an…
Expand
2011
2011
Computer Aided Verification of Accountability in Electronic Payment Protocol with CryptoVerif
Bo Meng
2011
Corpus ID: 17452273
During the past few decades electronic payment protocols has been studied. A lot of electronic payment protocols, for example…
Expand
2011
2011
Computationally Sound Mechanized Proofs for Electronic Payment Protocol in a Probabilistic Polynomial Calculus with CryptoVerif
Bo Meng
,
Lin Li
,
Fei Shao
2011
Corpus ID: 61476283
During the past few decades electronic payment protocols has been studied. A lot of electronic payment protocols have been…
Expand
2010
2010
The computational and decisional Diffie-Hellman assumptions in CryptoVerif
B. Blanchet
,
D. Pointcheval
2010
Corpus ID: 59922823
We present an extension of CryptoVerif to Diffie-Hellman key agreements. CryptoVerif [1] is a security protocol verifier sound in…
Expand
2010
2010
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility
Miyako Ohkubo
,
Shin'ichiro Matsuo
,
Yoshikazu Hanatani
,
K. Sakiyama
,
K. Ohta
IACR Cryptology ePrint Archive
2010
Corpus ID: 15107326
The proloferation of RFID tags enhances everyday activities, such as by letting us reference the price, origin and circulation…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE