- Page 1: Logical Analysis and Verification o
- Page 7 and 8: Résumé Cette thèse est développ
- Page 9 and 10: Contents 1 Introduction 1 1.1 Crypt
- Page 11 and 12: CONTENTS xi 3.6 Conclusions . . . .
- Page 13 and 14: Chapter 1 Introduction In our socie
- Page 15 and 16: 1.1. CRYPTOGRAPHIC PROTOCOLS 3 (pla
- Page 17 and 18: 1.2. CRYPTOGRAPHIC PRIMITIVES 5 1.2
- Page 19 and 20: 1.2. CRYPTOGRAPHIC PRIMITIVES 7 fro
- Page 21 and 22: 1.3. EXAMPLE: NEEDHAM-SCHROEDER PRO
- Page 23 and 24: 1.4. ANALYSIS OF CRYPTOGRAPHIC PROT
- Page 25 and 26: 1.4. ANALYSIS OF CRYPTOGRAPHIC PROT
- Page 27 and 28: 1.5. CONTRIBUTIONS AND PLAN OF THIS
- Page 29 and 30: 1.5. CONTRIBUTIONS AND PLAN OF THIS
- Page 31 and 32: Chapter 2 Constraint systems to ana
- Page 33 and 34: 2.1. PRELIMINARIES 21 the function
- Page 35 and 36: 2.1. PRELIMINARIES 23 • well-foun
- Page 37 and 38: 2.1. PRELIMINARIES 25 Figure 2.1 Kn
- Page 39 and 40: 2.1. PRELIMINARIES 27 Figure 2.2 Ba
- Page 41 and 42: 2.1. PRELIMINARIES 29 2.1.7 Unifica
- Page 43 and 44: 2.1. PRELIMINARIES 31 Figure 2.4 Un
- Page 45 and 46: 2.1. PRELIMINARIES 33 2.1.9 Narrowi
- Page 47 and 48: 2.1. PRELIMINARIES 35 Remark. It is
- Page 49 and 50: 2.1. PRELIMINARIES 37 a dedicated f
- Page 51 and 52: 2.1. PRELIMINARIES 39 form. If ther
- Page 53 and 54: 2.1. PRELIMINARIES 41 2.1.11 Varian
- Page 55 and 56:
2.1. PRELIMINARIES 43 2.1.12 Constr
- Page 57 and 58:
2.1. PRELIMINARIES 45 • Ei ⊆ Ei
- Page 59 and 60:
2.1. PRELIMINARIES 47 PROOF. By hyp
- Page 61 and 62:
2.2. CRYPTOGRAPHIC PROTOCOLS 49 •
- Page 63 and 64:
2.2. CRYPTOGRAPHIC PROTOCOLS 51 Exa
- Page 65 and 66:
2.3. FROM CRYPTOGRAPHIC PROTOCOLS T
- Page 67 and 68:
2.4. CONCLUSION 55 2.4 Conclusion I
- Page 69 and 70:
Chapter 3 Analysis of protocols wit
- Page 71 and 72:
3.1. HASH FUNCTIONS 59 A related ap
- Page 73 and 74:
3.2. COLLISION VULNERABILITY PROPER
- Page 75 and 76:
3.3. THE MODEL 63 3.3.2 Well-moded
- Page 77 and 78:
3.3. THE MODEL 65 Definition 37 (we
- Page 79 and 80:
3.3. THE MODEL 67 • InA = � x A
- Page 81 and 82:
3.4. SYMBOLIC FORMALISATION 69 make
- Page 83 and 84:
3.4. SYMBOLIC FORMALISATION 71 We r
- Page 85 and 86:
3.4. SYMBOLIC FORMALISATION 73 �
- Page 87 and 88:
3.4. SYMBOLIC FORMALISATION 75 with
- Page 89 and 90:
3.5. DECIDABILITY RESULTS 77 2. By
- Page 91 and 92:
3.5. DECIDABILITY RESULTS 79 Theore
- Page 93 and 94:
Chapter 4 Analysis of protocols wit
- Page 95 and 96:
4.1. SIGNATURE SCHEMES 83 4.1.2 Cla
- Page 97 and 98:
4.1. SIGNATURE SCHEMES 85 Signature
- Page 99 and 100:
4.2. DUPLICATE-SIGNATURE KEY SELECT
- Page 101 and 102:
4.2. DUPLICATE-SIGNATURE KEY SELECT
- Page 103 and 104:
4.4. DECIDABILITY RESULTS 91 4.4.1
- Page 105 and 106:
4.4. DECIDABILITY RESULTS 93 Lemma
- Page 107 and 108:
4.4. DECIDABILITY RESULTS 95 PROOF.
- Page 109 and 110:
4.4. DECIDABILITY RESULTS 97 Figure
- Page 111 and 112:
4.4. DECIDABILITY RESULTS 99 Proper
- Page 113 and 114:
4.4. DECIDABILITY RESULTS 101 4.4.5
- Page 115 and 116:
4.4. DECIDABILITY RESULTS 103 Apply
- Page 117 and 118:
4.4. DECIDABILITY RESULTS 105 �
- Page 119 and 120:
4.4. DECIDABILITY RESULTS 107 σ |=
- Page 121 and 122:
4.5. CONCLUSION 109 In the next cha
- Page 123 and 124:
Chapter 5 Decidability results for
- Page 125 and 126:
5.2. FINITE VARIANT PROPERTY 113 ex
- Page 127 and 128:
5.2. FINITE VARIANT PROPERTY 115 st
- Page 129 and 130:
5.3. SATURATION OF INTRUDER DEDUCTI
- Page 131 and 132:
5.3. SATURATION OF INTRUDER DEDUCTI
- Page 133 and 134:
5.4. ALGORITHM FOR SOLVING REACHABI
- Page 135 and 136:
5.4. ALGORITHM FOR SOLVING REACHABI
- Page 137 and 138:
5.4. ALGORITHM FOR SOLVING REACHABI
- Page 139 and 140:
5.5. DECIDABILITY RESULTS 127 const
- Page 141 and 142:
5.5. DECIDABILITY RESULTS 129 Howev
- Page 143 and 144:
5.5. DECIDABILITY RESULTS 131 • i
- Page 145 and 146:
5.5. DECIDABILITY RESULTS 133 {f(x,
- Page 147 and 148:
5.6. APPLICATIONS: SOME RELEVANT EQ
- Page 149 and 150:
5.7. DECIDABILITY OF GROUND REACHAB
- Page 151 and 152:
5.7. DECIDABILITY OF GROUND REACHAB
- Page 153 and 154:
5.8. DECIDABILITY OF REACHABILITY P
- Page 155 and 156:
5.8. DECIDABILITY OF REACHABILITY P
- Page 157 and 158:
5.10. CONCLUSION 145 syntactic cond
- Page 159 and 160:
Chapter 6 Decidability of ground en
- Page 161 and 162:
6.1. PRELIMINARIES 149 Herbrand int
- Page 163 and 164:
6.1. PRELIMINARIES 151 The clause (
- Page 165 and 166:
6.2. DECIDABLE FRAGMENTS OF FIRST O
- Page 167 and 168:
6.3. FROM CRYPTOGRAPHIC PROTOCOLS T
- Page 169 and 170:
6.3. FROM CRYPTOGRAPHIC PROTOCOLS T
- Page 171 and 172:
6.4. OUR CONTRIBUTION 159 I is CI d
- Page 173 and 174:
6.4. OUR CONTRIBUTION 161 with each
- Page 175 and 176:
6.5. A DECIDABILITY RESULT 163 {na,
- Page 177 and 178:
6.5. A DECIDABILITY RESULT 165 rema
- Page 179 and 180:
6.5. A DECIDABILITY RESULT 167 be d
- Page 181 and 182:
6.5. A DECIDABILITY RESULT 169 �
- Page 183 and 184:
6.5. A DECIDABILITY RESULT 171 A
- Page 185 and 186:
6.5. A DECIDABILITY RESULT 173 Thus
- Page 187 and 188:
6.6. DISCUSSIONS AND CONCLUSIONS 17
- Page 189 and 190:
Chapter 7 Formalising voter verifia
- Page 191 and 192:
7.1. ELECTRONIC VOTING PROTOCOLS 17
- Page 193 and 194:
7.2. APPLIED PI CALCULUS 181 contai
- Page 195 and 196:
7.2. APPLIED PI CALCULUS 183 COMM c
- Page 197 and 198:
7.4. FORMALISING VOTER VERIFIABILIT
- Page 199 and 200:
7.5. CASES STUDIES 187 7.5 Cases st
- Page 201 and 202:
7.5. CASES STUDIES 189 sdec(senc(x,
- Page 203 and 204:
7.5. CASES STUDIES 191 re-encryptio
- Page 205 and 206:
7.7. CONCLUSION 193 the complexity
- Page 207 and 208:
7.7. CONCLUSION 195 Figure 7.3 Lee
- Page 209 and 210:
Chapter 8 Conclusion and Perspectiv
- Page 211 and 212:
equational theory, i.e. we reason m
- Page 213 and 214:
Bibliography [1] Logic in Computer
- Page 215 and 216:
BIBLIOGRAPHY 203 [25] M. Backes, C.
- Page 217 and 218:
BIBLIOGRAPHY 205 [48] B. Blanchet.
- Page 219 and 220:
BIBLIOGRAPHY 207 [72] Y. Chevalier,
- Page 221 and 222:
BIBLIOGRAPHY 209 [94] M. Daum and S
- Page 223 and 224:
BIBLIOGRAPHY 211 [119] S. Hirose an
- Page 225 and 226:
BIBLIOGRAPHY 213 [146] Ch. Lynch. S
- Page 227 and 228:
BIBLIOGRAPHY 215 [173] R. L. Rivest
- Page 229:
BIBLIOGRAPHY 217 [200] X. Wang, X.