Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2005
Provable anonymity
FMSE '05: Proceedings of the 2005 ACM workshop on Formal methods in security engineeringPages 63–72https://doi.org/10.1145/1103576.1103585This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic.The key ingredient is our notion of observational equivalence, which is based on the cryptographic ...
- ArticleNovember 2005
Towards computationally sound symbolic analysis of key exchange protocols
FMSE '05: Proceedings of the 2005 ACM workshop on Formal methods in security engineeringPages 23–32https://doi.org/10.1145/1103576.1103580We present a cryptographically sound formal method for proving correctness of key exchange protocols. Our main tool is a fragment of a symbolic protocol logic. We demonstrate that proofs of key agreement and key secrecy in this logic imply ...
- ArticleNovember 2005
A rewriting-based inference system for the NRL protocol analyzer: grammar generation
FMSE '05: Proceedings of the 2005 ACM workshop on Formal methods in security engineeringPages 1–12https://doi.org/10.1145/1103576.1103578The NRL Protocol Analyzer (NPA) is a tool for the formal specification and analysis of cryptographic protocols that has been used with great effect on a number of complex real-life protocols. It probably outranks any of the existing tools in the sheer ...