DIMACS Workshop on Security Analysis of Protocols
June 7 - 9, 2004
DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ
- Organizers:
- John Mitchell, Stanford, mitchell@cs.stanford.edu
- Ran Canetti, IBM Watson, canetti@watson.ibm.com
Presented under the auspices of the
Special Focus on Communication Security and Information Privacy.
Workshop Program:
Monday, June 7, 2004
8:30 - 9:00 Registration - 1st Floor Lobby, CoRE Bldg.
Breakfast - 4th Floor Lounge
9:00 - 9:10 Welcome and Opening Remarks
Mel Janowitz, Associate Director, DIMACS
9:10 - 9:30 Welcome
John Mitchell, Stanford University
Ran Canetti, IBM Watson
9:30 - 10:30 Tutorial: Formal methods and protocol analysis
Peter Ryan, University of Newcastle Upon Tyne
10:30 - 11:00 Break
11:00 - 12:30 Session
Modeling and Analyzing Security Protocols Using I/O Automata
Nancy Lynch, MIT
Automata-based analysis of recursive cryptographic protocols
Thomas Wilke, Kiel University
Formal Analysis of Availability
Carl A. Gunter, University of Pennsylvania
12:30 - 2:00 Lunch
2:00 - 3:00 Tutorial: Towards cryptographically sound formal analysis
Daniele Micciancio, UCSD
3:00 - 3:30 Break
3:30 - 5:30 Session
A Reactively Secure Dolev-Yao-style Cryptographic Library
Birgit Pfitzmann, IBM Research
Towards Automated Computationally Faithful Verification of Cryptoprotocols
Jan Jürjens, TU Munich
Computational and Information-Theoretic Soundness
and Completeness of the Expanded Logics of Formal Encryption
Gergei Bana, University of Pennsylvania
Universally Composable Symbolic Analysis of Cryptographic Protocols
Jonathan Herzog, MIT
5:30 Reception - Wine and cheese - DIMACS Lounge
Tuesday, June 8, 2004
8:30 - 9:00 Breakfast and Registration - 4th Floor CoRE Bldg.
9:00 - 10:00 Tutorial - Secure Composition of Multiparty Protocols
Yehuda Lindell, IBM Research
10:00 - 10:30 Break
10:30 - 12:30 Session
New Notions of Security: Achieving Universal Composability
without Trusted Setup
Manoj Prabhakaran and Amit Sahai, Princeton University
Documented Ideal Protocols: A Flexible Notion of Universal
Composability for Simple Protocols and no Trusted Setup
Dominic Mayers, CalTech
A probabilistic polynomial-time calculus for the analysis of
cryptographic protocols
Andre Scedrov, University of Pennsylvania
Sequential Process Calculus and Machine Models for Simulation-based Security
Ralf Kuesters, University of Kiel
12:30 - 2:00 Lunch
2:00 - 3:00 Tutorial: Proving protocol properties
Joshua D. Guttman, MITRE
3:00 - 3:30 Break
3:30 - 5:30 Session
Machine-Checked Formalization of the Generic Model and the Random Oracle Model
Sabrina Tarento, INRIA
A Notation for Multiparty Protocols of ITM's: Digging from the Tunnel's Other End
Jesus F. Almansa, University of Aarhus
Monte-Carlo Analysis of Protocols
Radu Grosu, SUNY Stony Brook
A Framework for Security Analysis with Team Automata
Marinella Petrocchi, IIT-CNR, Italy
5:30 End of Session
Wednesday, June 9, 2004
8:30 - 9:00 Breakfast and Registration - 4th Floor CoRE Bldg.
9:00 - 10:00 Tutorial: Formal representations of polynomial-time algorithms and security
Bruce Kapron, University of Victoria
10:00 - 10:30 Break
10:30 - 12:30 Session
Collusion-Free Protocols
Silvio Micali, MIT
A Framework for Fair (Multi-Party) Computation
Juan Garay, Bell Labs
Dolev-Yao-type Abstraction of Modular Exponentiation - the Cliques Case Study
Olivier Pereira and Jean-Jacques Quisquater, UCL
Message Equivalence and Imperfect Cryptography in a Formal Model
Angelo Troina, Univerity of Pisa
12:30 - 1:30 Lunch
1:30 - 2:30 Tutorial: Constraint-based methods:
Adding computational properties to symbolic models
Vitaly Shmatikov, SRI
2:30 - 3:00 Break
3:00 - 4:30 Session
Towards a Hierarchy of Cryptographic Protocol Models
Cathy Meadows, NRL
Sound Approximations to Diffie-Hellman Using Rewrite Rules
Christopher Lynch, Clarkson University
Fine-Grained MSR Specifications for Quantitative Security Analysis
Iliano Cervesato, NRL
4:30 End of Workshop
Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on June 1, 2004.