Computer-aided security proofs for the working cryptographer. We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic systems from proof sketches-compact, formal representations of the essence of a proof as a sequence of games and hints. Proof sketches are checked automatically using off-the-shelf SMT solvers and automated theorem provers, and then compiled into verifiable proofs in the CertiCrypt framework. The tool supports most common reasoning patterns and is significantly easier to use than its predecessors. We argue that EasyCrypt is a plausible candidate for adoption by working cryptographers and illustrate its application to security proofs of the Cramer-Shoup and Hashed ElGamal cryptosystems.

References in zbMATH (referenced in 30 articles , 1 standard article )

Showing results 1 to 20 of 30.
Sorted by year (citations)

1 2 next

  1. Butler, D.; Lochbihler, A.; Aspinall, D.; Gascón, A.: Formalising (\varSigma)-protocols and commitment schemes using crypthol (2021)
  2. Barthe, Gilles; Betarte, Gustavo; Campo, Juan Diego; Luna, Carlos; Pichardie, David: System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory (2020)
  3. Basin, David A.; Lochbihler, Andreas; Sefidgar, S. Reza: CryptHOL: game-based proofs in higher-order logic (2020)
  4. Baillot, Patrick; Barthe, Gilles; Dal Lago, Ugo: Implicit computational complexity of subrecursive definitions and applications to cryptographic proofs (2019)
  5. Austin, Evan; Batson, Scott; Curry, Peter; Williams, Bryan: Finding a middle ground for computer-aided cryptography (2018)
  6. Bloem, Roderick; Gross, Hannes; Iusupov, Rinat; Könighofer, Bettina; Mangard, Stefan; Winter, Johannes: Formal verification of masked hardware implementations in the presence of glitches (2018)
  7. Barthe, Gilles; Espitau, Thomas; Grégoire, Benjamin; Hsu, Justin; Strub, Pierre-Yves: Proving uniformity and independence by self-composition and coupling (2017)
  8. Dal Lago, Ugo; Grellois, Charles: Probabilistic termination by monadic affine sized typing (2017)
  9. Jager, Tibor; Kohlar, Florian; Schäge, Sven; Schwenk, Jörg: Authenticated confidential channel establishment and the security of TLS-DHE (2017)
  10. Barthe, Gilles; Gaboardi, Marco; Arias, Emilio Jesús Gallego; Hsu, Justin; Roth, Aaron; Strub, Pierre-Yves: Computer-aided verification for mechanism design (2016)
  11. Gagné, Martin; Lafourcade, Pascal; Lakhnech, Yassine; Safavi-Naini, Reihaneh: Automated proofs of block cipher modes of operation (2016)
  12. Lochbihler, Andreas: Probabilistic functions and cryptographic oracles in higher order logic (2016)
  13. Meadows, Catherine: Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later (2015)
  14. Nowak, David; Zhang, Yu: Formal security proofs with minimal fuss: implicit computational complexity at work (2015)
  15. Rand, Robert; Zdancewic, Steve: VPHL: a verified partial-correctness logic for probabilistic programs (2015)
  16. Barthe, Gilles; Dupressoir, François; Grégoire, Benjamin; Kunz, César; Schmidt, Benedikt; Strub, Pierre-Yves: EasyCrypt: a tutorial (2014)
  17. Barthe, Gilles; Fournet, Cédric; Grégoire, Benjamin; Strub, Pierre-Yves; Swamy, Nikhil; Zanella-Béguelin, Santiago: Probabilistic relational verification for cryptographic implementations (2014)
  18. Blanchet, Bruno: Automatic verification of security protocols in the symbolic model: the verifier ProVerif (2014)
  19. Ayala-Rincón, Mauricio; Rego, Yuri Santos: Formalization in PVS of balancing properties necessary for proving security of the Dolev-Yao cascade protocol model (2013)
  20. Barthe, Gilles; Crespo, Juan Manuel; Kunz, César: Beyond 2-safety: asymmetric product programs for relational program verification (2013)

1 2 next