Home
Course description
Lecture notes
Assignments
Projects
Tools
Reference
|
CS 395T - Design and Analysis of Security Protocols (54302)
Fall 2004
Reference materials
Design principles for security protocols
Protocol libraries
Needham-Schroeder
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
Internet Key Exchange (IKE)
Just Fast Keying (JFK)
-
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
by Aiello, Bellovin, Blaze, Canetti, Ioannidis, Keromytis, and Reingold
-
Just Fast Keying (JFK) specification
-
Derivation of the JFK Protocol by Datta, Mitchell, and Pavlovic
-
Just Fast Keying in the Pi Calculus by Abadi, Blanchet, and Fournet
Anonymity
Probabilistic analysis of security protocols
Protocol composition logic and the inductive method
Symbolic constraint solving
Cryptographic definitions of security
Computational soundness of formal methods
Universal composability
Probabilistic polynomial-time process calculus
Fair exchange and contract signing
-
Impossibility of Distributed Consensus with One
Faulty Process by Fischer, Lynch, and Paterson
-
On the Impossibility of Fair Exchange Without a
Trusted Third Party by Pagnia and Gärtner
-
Optimistic Fair Exchange of
Digital Signatures by Asokan, Shoup, and Waidner
-
Abuse-Free
Optimistic Contract Signing by Garay, Jakobsson, and MacKenzie
-
A Game-Based Verification of Non-Repudiation and Fair Exchange
Protocols by Kremer and Raskin
-
Game Analysis of Abuse-Free Contract Signing by Kremer and Raskin
-
Finite-State
Analysis of Two Contract Signing Protocols by Shmatikov and Mitchell
-
Contract Signing, Optimism, and Advantage
by Chadha, Mitchell, Scedrov, and Shmatikov
|