Skip to Main content Skip to Navigation
New interface
Conference papers

Security Protocol Verification with Implicit Induction and Explicit Destructors

Adel Bouhoula 1 Florent Jacquemard 2 
2 DAHU - Verification in databases
LSV - Laboratoire Spécification et Vérification [Cachan], Inria Saclay - Ile de France
Abstract : We present a new method for automatic implicit induction theorem proving, and its application for the verification of a key distribution cryptographic protocol. The method can handle axioms between constructor terms, a feature generally not supported by other induction procedure. We use such axioms in order to specify explicit destructors representing cryptographic operators.
Document type :
Conference papers
Complete list of metadata

Cited literature [7 references]  Display  Hide  Download
Contributor : Florent Jacquemard Connect in order to contact the contributor
Submitted on : Tuesday, March 22, 2011 - 11:36:15 PM
Last modification on : Thursday, January 20, 2022 - 4:13:06 PM
Long-term archiving on: : Thursday, June 23, 2011 - 3:00:44 AM


Files produced by the author(s)


  • HAL Id : inria-00579018, version 1


Adel Bouhoula, Florent Jacquemard. Security Protocol Verification with Implicit Induction and Explicit Destructors. 1st International Workshop on Security and Rewriting Techniques (SecReT), Jul 2006, Venice, Italy. pp.37-44. ⟨inria-00579018⟩



Record views


Files downloads