Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols (original) (raw)
Related papers
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols
2003
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
A Derivation System for Security Protocols and its Logical Formalization
2003
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Lecture Notes in Computer Science, 2001
A derivation system and compositional logic for security protocols
Journal of Computer Security, 2005
Proving Security Protocols Correct
1999
Proving secure properties of cryptographic protocols with knowledge based approach
2005
Provable-security analysis of authenticated encryption in kerberos
2011
A formal framework for verifying IKA property of protocols
Journal of King Saud University - Computer and Information Sciences, 2017
Computationally sound verification of security protocols using Diffie-Hellman exponentiation
2005
Verifying Mutual Authentication for the DLK Protocol using ProVerif tool
Hussam Al Hamadi, Mohamed Jamal A Zemerly
Contribution to enhance IPSec security by a safe and efficient internet key exchange protocol
2013 World Congress on Computer and Information Technology (WCCIT), 2013
A formal framework for verifying IKA property of protocols q 4 5 6
Security Analysis of IKE’s Signature-Based Key-Exchange Protocol
Lecture Notes in Computer Science, 2002
HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols
Lecture Notes in Computer Science, 2003
Kerberos Version 4: Inductive Analysis of the Secrecy Goals
1998
Symbolic Protocol Analysis for Diffie-Hellman
2012
A Study on Diffie-Hellman Key Exchange Protocols
International Journal of Pure and Apllied Mathematics, 2017
Security Verification for Authentication and Key Exchange Protocols, Revisited
2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, 2010
Formal analysis of key exchange protocols and physical protocols
2012
Abstraction and resolution modulo AC: How to verify Diffie–Hellman-like protocols automatically
The Journal of Logic and Algebraic Programming, 2005
Security Protocols: Specification, Verification, Implementation, and Composition
2016
Proving Authentication Properties in the Protocol Derivation Assistant
2006
Security verification for authentication and key exchange protocols
2008 International Symposium on Information Theory and Its Applications, 2008
A provably secure one-pass two-party key establishment protocol
Information Security and …, 2008
FORMAL VERIFICATION TECHNIQUES FOR COMPUTER COMMUNICATION SECURITY PROTOCOLS
Computationally Sound, Automated Proofs for Security Protocols
Lecture Notes in Computer Science, 2005
Strengthening the security of key exchange protocols
2014
Mechanized Proofs of Security Protocols: Needham-Schroeder with Public Keys
1997
Formal Verification of Secrecy in Group Key Protocols Using Event-B
Int'l J. of Communications, Network and System Sciences, 2012
Authenticated Key Exchange Secure Against Dictionary Attacks
Relations Between Secrets: Two Formal Analyses of the Yahalom Protocol
Formal automatic verification of authentication cryptographic protocols
Proceedings First IEEE International Conference on Formal Engineering Methods, 1997
Proving Properties of Security Protocols by Induction
1997
Authentication primitives for secure protocol specifications
Future Generation Computer Systems, 2005