Security
Security (M1)
Useful ressources:
- For the fomalization of term algebra, and process algebras, David Baelde's lecture notes.
- For the decidability of deducibility constraints, the legacy lecture notes from the MPRI M2 course.
- Other course Formal Models and Techniques for Analyzing Security Protocols: A Tutorial by Véronique Cortier (Directrice de Recherche CNRS @ LORIA) and Steve Kremer (Directeur de Recherche @ INRIA Nancy)
Teaching materials 2025 - 2026
Exercises sheets
- TD 1 - Security properties and process calculus
- TD 2 - Security properties in the symbolic model
- TD 3 - Deduction system for the symbolic setting
- TD 4 - Intruder deduction problem and locality
- TD 5 - Deducibility constraints in the symbolic model
Homeworks
- Homework 1 - PAKE0: A Password Authenticated Key Exchange protocol (deadline 8th of December 2025).
- Homework 2 - Constraint system solving (deadline 5th of January 2026).
Archives of past years
Exercises sheets
Exams
- (2024-2025) Homework (deadline 7th of January 2025 midnight).