Proved generation of implementations from computationally secure protocol specifications.
David CadéBruno BlanchetPublished in: J. Comput. Secur. (2015)
Keyphrases
- cryptographic protocols
- covert channel
- lightweight
- security protocols
- scalar product
- secure routing
- authentication protocol
- key distribution
- key agreement protocol
- group communication
- key exchange protocol
- multi party
- security analysis
- provably secure
- protocol specification
- secure multi party
- cryptographic algorithms
- diffie hellman
- security services
- password authentication
- high level
- security properties
- vertically partitioned data
- key agreement
- state machines
- key management
- security requirements
- electronic voting
- communication protocols
- digital signature scheme
- privacy preserving
- formal specification
- homomorphic encryption
- formal analysis
- delay insensitive
- communication protocol
- rfid systems
- secret key
- elliptic curve
- security model
- user authentication
- distributed databases
- smart card
- electronic commerce
- tcp ip