ACM Transactions on Computer Systems (TOCS)
A calculus for cryptographic protocols: the spi calculus
Proceedings of the 4th ACM conference on Computer and communications security
A calculus for control flow analysis of security protocols
International Journal of Information Security - Special issue on security in global computing
Static validation of security protocols
Journal of Computer Security
A calculus of challenges and responses
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags
Electronic Notes in Theoretical Computer Science (ENTCS)
Detecting and preventing type flaws at static time
Journal of Computer Security - Security Issues in Concurrency (SecCo'07)
Hi-index | 0.00 |
We construct a language extension for process calculi for modelling the exchange of cryptographically composed data. More specifically, we devise a succinct syntax for terms and patterns that captures the intention behind perfect cryptography. The proposed language extension is independent of the choice of process calculus and is applicable to any calculus that supports exchange of data. Initially we restrict the model to symmetric cryptography, but we also show how it can be extended with support for asymmetric encryption and digital signatures.