We present CASRUL, a compiler for cryptographic protocols specifications. Its purpose is to verify the executability of protocols and to translate them into rewrite rules that can be used by several kinds of automatic or semi-automatic tools for finding design flaws. We also present a related comple
โฆ LIBER โฆ
Verification of high-level protocol implementations
โ Scribed by Ken Weaving
- Publisher
- Elsevier Science
- Year
- 1981
- Tongue
- English
- Weight
- 469 KB
- Volume
- 4
- Category
- Article
- ISSN
- 0140-3664
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
The Practice of Cryptographic Protocol V
โ
Michael Rusinowitch
๐
Article
๐
2003
๐
Elsevier Science
๐
English
โ 119 KB
High level protocol for alphanumeric dat
โ
Najah Naffah
๐
Article
๐
1978
๐
Elsevier Science
โ 885 KB
The authenticated datagram protocol: A h
โ
P.Venkat Rangan
๐
Article
๐
1993
๐
Elsevier Science
๐
English
โ 973 KB
Verification of protocols using symbolic
โ
Daniel Brand; William H Joyner Jr.
๐
Article
๐
1978
๐
Elsevier Science
โ 896 KB
Rewriting-Based Verification of Authenti
โ
Kazuhiro Ogata; Kokichi Futatsugi
๐
Article
๐
2004
๐
Elsevier Science
๐
English
โ 266 KB
We propose a method of formally analysing security protocols based on rewriting. The method is roughly as follows. A security protocol is modeled as an observational transition system, which is described in CafeOBJ. Proof scores showing that the protocol has safety (security) properties are then wri
Data independent verification of crypto-
โ
A.W. Roscoe; Philippa Broadfoot; Gavin Lowe
๐
Article
๐
2001
๐
Elsevier Science
๐
English
โ 29 KB