Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols (original) (raw)

SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols

Phil Menezes

2003

View PDFchevron_right

Provably secure password-authenticated key exchange using Diffie-Hellman

sindulakshmi l.narayanan

Advances in Cryptology—Eurocrypt …, 2000

View PDFchevron_right

A Derivation System for Security Protocols and its Logical Formalization

Anupam Datta

2003

View PDFchevron_right

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels

Ran Canetti

Lecture Notes in Computer Science, 2001

View PDFchevron_right

A derivation system and compositional logic for security protocols

Anupam Datta

Journal of Computer Security, 2005

View PDFchevron_right

Proving Security Protocols Correct

Lawrence Paulson

1999

View PDFchevron_right

Proving secure properties of cryptographic protocols with knowledge based approach

maggie cheng

2005

View PDFchevron_right

Provable-security analysis of authenticated encryption in kerberos

Alexandra Boldyreva

2011

View PDFchevron_right

A formal framework for verifying IKA property of protocols

Priya Chandran

Journal of King Saud University - Computer and Information Sciences, 2017

View PDFchevron_right

Computationally sound verification of security protocols using Diffie-Hellman exponentiation

Yassine Lakhnech

2005

View PDFchevron_right

Verifying Mutual Authentication for the DLK Protocol using ProVerif tool

Hussam Al Hamadi, Mohamed Jamal A Zemerly

View PDFchevron_right

Contribution to enhance IPSec security by a safe and efficient internet key exchange protocol

Nacira Ghoualmi

2013 World Congress on Computer and Information Technology (WCCIT), 2013

View PDFchevron_right

A formal framework for verifying IKA property of protocols q 4 5 6

Rahul Prasad

View PDFchevron_right

Security Analysis of IKE’s Signature-Based Key-Exchange Protocol

Ran Canetti

Lecture Notes in Computer Science, 2002

View PDFchevron_right

HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols

Yassine Lakhnech

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Kerberos Version 4: Inductive Analysis of the Secrecy Goals

Lawrence Paulson

1998

View PDFchevron_right

Symbolic Protocol Analysis for Diffie-Hellman

Joshua Guttman

2012

View PDFchevron_right

A Study on Diffie-Hellman Key Exchange Protocols

M R Mishra

International Journal of Pure and Apllied Mathematics, 2017

View PDFchevron_right

Security Verification for Authentication and Key Exchange Protocols, Revisited

Shinsaku Kiyomoto

2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, 2010

View PDFchevron_right

Formal analysis of key exchange protocols and physical protocols

Benedikt Schmidt

2012

View PDFchevron_right

Abstraction and resolution modulo AC: How to verify Diffie–Hellman-like protocols automatically

Jean Goubault-larrecq

The Journal of Logic and Algebraic Programming, 2005

View PDFchevron_right

Security Protocols: Specification, Verification, Implementation, and Composition

Omar Almousa

2016

View PDFchevron_right

Proving Authentication Properties in the Protocol Derivation Assistant

Richard Waldinger

2006

View PDFchevron_right

Security verification for authentication and key exchange protocols

Shinsaku Kiyomoto

2008 International Symposium on Information Theory and Its Applications, 2008

View PDFchevron_right

A provably secure one-pass two-party key establishment protocol

Spyros Halkidis

Information Security and …, 2008

View PDFchevron_right

FORMAL VERIFICATION TECHNIQUES FOR COMPUTER COMMUNICATION SECURITY PROTOCOLS

bimam bref

View PDFchevron_right

Computationally Sound, Automated Proofs for Security Protocols

Bogdan Warinschi

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Strengthening the security of key exchange protocols

Michele Feltz

2014

View PDFchevron_right

Mechanized Proofs of Security Protocols: Needham-Schroeder with Public Keys

Lawrence Paulson

1997

View PDFchevron_right

Formal Verification of Secrecy in Group Key Protocols Using Event-B

Leila Ben Ayed

Int'l J. of Communications, Network and System Sciences, 2012

View PDFchevron_right

Authenticated Key Exchange Secure Against Dictionary Attacks

Satheesh Sharma

View PDFchevron_right

Relations Between Secrets: Two Formal Analyses of the Yahalom Protocol

Lawrence Paulson

View PDFchevron_right

Formal automatic verification of authentication cryptographic protocols

Nadia Tawbi

Proceedings First IEEE International Conference on Formal Engineering Methods, 1997

View PDFchevron_right

Proving Properties of Security Protocols by Induction

Lawrence Paulson

1997

View PDFchevron_right

Authentication primitives for secure protocol specifications

Pierpaolo Degano

Future Generation Computer Systems, 2005

View PDFchevron_right