Daniel J. Dougherty
YOU?
Author Swipe
View article: A Coq Formalization of Unification Modulo Exclusive-Or
A Coq Formalization of Unification Modulo Exclusive-Or Open
Equational Unification is a critical problem in many areas such as automated theorem proving and security protocol analysis. In this paper, we focus on XOR-Unification, that is, unification modulo the theory of exclusive-or. This theory co…
View article: Molly: A Verified Compiler for Cryptoprotocol Roles
Molly: A Verified Compiler for Cryptoprotocol Roles Open
Molly is a program that compiles cryptographic protocol roles written in a high-level notation into straight-line programs in an intermediate-level imperative language, suitable for implementation in a conventional programming language. We…
View article: Homomorphisms and Minimality for Enrich-by-Need Security Analysis
Homomorphisms and Minimality for Enrich-by-Need Security Analysis Open
Cryptographic protocols are used in different environments, but existing methods for protocol analysis focus only on the protocols, without being sensitive to assumptions about their environments. LPA is a tool which analyzes protocols in …
View article: Razor: Provenance and Exploration in Model-Finding
Razor: Provenance and Exploration in Model-Finding Open
Razor is a model-finder for first-order theories presented geometric form; geometric logic is a variant of first-order logic that focuses on ``observable'' properties. An important guiding principle of Razor is that it be accessible to use…