DIMACS Workshop on Security Analysis of Protocols
 June 7 - 9, 2004
 DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ


  John Mitchell, Stanford, [EMAIL PROTECTED] 
  Ran Canetti, IBM Watson, [EMAIL PROTECTED] 
Presented under the auspices of the Special Focus on Communication
Security and Information Privacy.


The analysis of cryptographic protocols is a fundamental and
challenging area of network security research. Traditionally, there
have been two main approaches, the logic approach aimed at developing
(automated) tools for the formal veri.cation of protocols and the
complexity theory approach that characterizes protocol security as a
set of computational tasks and proves protocol security via reduction
to the strength of the underlying cryptographic functions. Although
these two lines of work share a common goal, there has been little
commonality between them.

The goal of this workshop is to generally promote work on security
analysis of protocols and foster cooperative research combining the
logical and complexity-based approaches. The workshop will include
tutorials on the basics of each approach and will allow
representatives from both communities to talk about their current


    * - Analysis methods involving computational complexity
    * - Game-theoretic approaches
    * - Methods based on logic and symbolic computation
    * - Probabilistic methods
    * - Model checking and symbolic search
    * - Formal proof systems
    * - Decision procedures and lower bounds
    * - Anything else that sounds like a great idea 


The workshop will be open for the public. If you'd like to give a
presentation please send a title and abstract to the organizers as
soon as possible. Also, we intend this to be a participatory and
interactive meeting so we hope you will be able to contribute to the
meeting even without giving an announced talk.

Registration Fees:

(Pre-registration deadline: May 28, 2004)

Please see website for information on registration.

Information on participation, registration, accomodations, and travel 
can be found at:




The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to