Abstract: We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) ...
Explore formal verification's role in securing Model Context Protocol (MCP) deployments against quantum computing attacks. Learn how mathematical proofs and verification tools ensure robust AI ...
Abstract: We formalize security properties of zero-knowledge protocols and their proofs in EasyCrypt. Specifically, we focus on sigma protocols (three-round protocols). Most importantly, we also cover ...
EasyCrypt is a toolset for reasoning about relational properties of probabilistic computations with adversarial code. Its main application is the construction and verification of code-based, ...
We run a programme of regular seminar afternoons (each themed on a specific area of cyber security), regular cyber security meetings aimed at local businesses, and conferences. These events are an ...
This repository (under the tag cpp2022) contains the snapshot of EasyCrypt code associated with the paper "D. Firsov, D. Unruh. Reflection, Rewinding, and Coin-Toss in EasyCrypt." published on CPP2022 ...
There has long been an imbalance of forces in information technology: to make their programs absolutely safe, software developers have to predict every conceivable attack and take appropriate action.
I work on developing and applying computer-aided techniques for the evaluation of cryptographic algorithms and protocols, and their implementations. I am a Senior Lecturer in the Cryptography Group ...
CertiCrypt and EasyCrypt are machine-checked frameworks for proving the security of cryptographic constructions. Both frameworks adhere to the game-based approach to provable security, but revisit its ...