Proved Generation of Implementations from Computationally Secure Protocol Specifications.
David CadéBruno BlanchetPublished in: POST (2013)
Keyphrases
- cryptographic protocols
- covert channel
- authentication protocol
- security analysis
- lightweight
- scalar product
- security protocols
- vertically partitioned data
- key distribution
- privacy preserving
- secure routing
- key exchange protocol
- group communication
- key agreement protocol
- secure multiparty computation
- security properties
- diffie hellman
- multi party
- model checker
- rfid systems
- provably secure
- protocol specification
- state machines
- key exchange
- security model
- homomorphic encryption
- cryptographic algorithms
- mobile agent system
- password authentication
- mutual authentication
- electronic voting
- key management
- security issues
- model checking
- delay insensitive
- trusted third party
- user authentication
- operational semantics
- standard model
- security mechanisms
- signature scheme
- digital signature scheme