Filtrer vos résultats
- 33
- 10
- 18
- 10
- 7
- 4
- 2
- 2
- 9
- 2
- 43
- 4
- 2
- 2
- 1
- 2
- 3
- 6
- 4
- 2
- 1
- 5
- 5
- 2
- 1
- 1
- 1
- 1
- 41
- 2
- 24
- 17
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 43
- 5
- 4
- 4
- 4
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
43 résultats
|
|
triés par
|
|
Composition Theorems for CryptoVerif and Application to TLS 1.3[Research Report] RR-9171, Inria Paris. 2018, pp.67
Rapport
hal-01764527v1
|
||
|
Mechanizing Game-Based Proofs of Security ProtocolsTobias Nipkow and Olga Grumberg and Benedikt Hauptmann. Software Safety and Security - Tools for Analysis and Verification, 33, IOS Press, pp.1--25, 2012, NATO Science for Peace and Security Series ― D: Information and Communication Security
Chapitre d'ouvrage
hal-00863389v1
|
||
Verification of Security Protocols with Lists: from Length One to Unbounded LengthJournal of Computer Security, 2013, 21 (6), pp.781--816
Article dans une revue
hal-00939187v1
|
|||
Automatic Verification of Protocols with Lists of Unbounded LengthCCS'13 - ACM Conference on Computer and Communications Security, ACM SIGSAC, Nov 2013, Berlin, Germany. pp.573--584, ⟨10.1145/2508859.2516679⟩
Communication dans un congrès
hal-00918849v1
|
|||
|
Analysing the HPKE Standard[Research Report] IACR Cryptology ePrint Archive. 2020
Rapport
hal-03113251v2
|
||
|
Composition Theorems for CryptoVerif and Application to TLS 1.331st IEEE Computer Security Foundations Symposium (CSF'18), Jul 2018, Oxford, United Kingdom. ⟨10.1109/CSF.2018.00009⟩
Communication dans un congrès
hal-01947959v1
|
||
|
CryptoVerif: a Computationally-Sound Security Protocol Verifier (Initial Version with Communications on Channels)RR-9525, Inria Paris. 2023, pp.166
Rapport
hal-04246199v1
|
||
|
CryptoVerif: a Computationally-Sound Security Protocol VerifierRR-9526, Inria. 2023, pp.194
Rapport
hal-04253820v1
|
||
Proved Generation of Implementations from Computationally Secure Protocol SpecificationsJournal of Computer Security, 2015, 23 (3), pp.331-402
Article dans une revue
hal-01102382v1
|
|||
|
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach2nd IEEE European Symposium on Security and Privacy , Apr 2017, Paris, France. pp.435 - 450, ⟨10.1109/EuroSP.2017.38⟩
Communication dans un congrès
hal-01575923v1
|
||
|
Verification of Security Protocols with Lists: from Length One to Unbounded LengthFirst Conference on Principles of Security and Trust (POST'12), 2012, Tallinn, Estonia. pp.69--88
Communication dans un congrès
hal-00863387v1
|
||
|
The Security Protocol Verifier ProVerif and its Horn Clause Resolution AlgorithmElectronic Proceedings in Theoretical Computer Science, 2022, 373, pp.14 - 22. ⟨10.4204/eptcs.373.2⟩
Article dans une revue
hal-03897677v1
|
||
|
Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers29th IEEE Computer Security Foundations Symposium (CSF'16), Jun 2016, Lisboa, Portugal. pp.310 - 324, ⟨10.1109/CSF.2016.29⟩
Communication dans un congrès
hal-01423742v1
|
||
|
Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols[Research Report] RR-9072, Inria Paris. 2017, pp.40
Rapport
hal-01527671v1
|
||
Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerifAlessandro Aldini; Javier Lopez; Fabio Martinelli. Foundations of Security Analysis and Design VII, 8604, Springer, pp.54-87, 2014, Lecture Notes in Computer Science, 978-3-319-10081-4. ⟨10.1007/978-3-319-10082-1_3⟩
Chapitre d'ouvrage
hal-01102136v1
|
|||
|
From Computationally-proved Protocol Specifications to Implementations7th International Conference on Availability, Reliability and Security (AReS 2012), 2012, Prague, Czech Republic. pp.65--74
Communication dans un congrès
hal-00863382v1
|
||
|
ProVerif with Lemmas, Induction, Fast Subsumption, and Much MoreS&P 2022 - 43rd IEEE Symposium on Security and Privacy, May 2022, San Francisco, United States
Communication dans un congrès
hal-03366962v1
|
||
|
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden. pp.231-246
Communication dans un congrès
hal-02396640v1
|
||
|
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate38th IEEE Symposium on Security and Privacy, May 2017, San Jose, United States. pp.483 - 502, ⟨10.1109/SP.2017.26⟩
Communication dans un congrès
hal-01575920v2
|
||
|
Automated reasoning for equivalences in the applied pi calculus with barriersJournal of Computer Security, 2018, 26 (3), pp.367 - 422. ⟨10.3233/JCS-171013⟩
Article dans une revue
hal-01947972v1
|
||
|
Proving More Observational Equivalences with ProVerifPOST 2013 - 2nd Conference on Principles of Security and Trust, Mar 2013, Rome, Italy. pp.226-246, ⟨10.1007/978-3-642-36830-1_12⟩
Communication dans un congrès
hal-00863377v1
|
||
Using Horn Clauses for Analyzing Security ProtocolsVéronique Cortier; Steve Kremer. Formal Models and Techniques for Analyzing Security Protocols, 5, IOS Press, pp.86 - 111, 2011, Cryptology and Information Security Series, 978-1-60750-713-0. ⟨10.3233/978-1-60750-714-7-86⟩
Chapitre d'ouvrage
hal-01110425v1
|
|||
|
CV2EC: Getting the Best of Both Worlds2023
Pré-publication, Document de travail
hal-04321656v1
|
||
|
From the Applied Pi Calculus to Horn Clauses for Protocols with Lists[Research Report] RR-8823, Inria. 2015, pp.45
Rapport
hal-01239290v1
|
||
|
Analysing the HPKE StandardEurocrypt 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Oct 2021, Zagreb, Croatia. pp.87-116, ⟨10.1007/978-3-030-77870-5_4⟩
Communication dans un congrès
hal-03471218v1
|
||
|
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol[Research Report] RR-9269, Inria Paris. 2019, pp.50
Rapport
hal-02100345v3
|
||
|
Automatically Verified Mechanized Proof of One-Encryption Key Exchange25th IEEE Computer Security Foundations Symposium (CSF'12), 2012, Cambridge, United States. pp.325--339
Communication dans un congrès
hal-00863386v1
|
||
Design and Implementation of a Special-Purpose Static Program Analyzer for Safety-Critical Real-Time Embedded SoftwareMogensen, T. and Schmidt, D.A. and Sudborough, I.H. The Essence of Computation: Complexity, Analysis, Transformation. Essays Dedicated to Neil D. Jones, 2566, Springer, pp.85-108, 2002, Lecture Notes in Computer Science, ⟨10.1007/3-540-36377-7_5⟩
Chapitre d'ouvrage
istex
inria-00528442v1
|
|||
From Computationally-Proved Protocol Specifications to Implementations and Application to SSHJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2013, 4 (1), pp.4--31
Article dans une revue
hal-00863374v1
|
|||
Proved Generation of Implementations from Computationally-Secure Protocol Specifications2nd Conference on Principles of Security and Trust (POST 2013), 2013, Rome, Italy. pp.63--82
Communication dans un congrès
hal-00863376v1
|
- 1
- 2