Summer school: Models and Tools for Cryptographic Proofs
This is the second part of the course
Models and Techniques for Symbolic Analysis of Security Protocols.
The first part was given by Véronique Cortier.
The slides of the course are available here.
The aim of the exercises is to learn to use ProVerif and DeepSec for verifying equivalence properties. The exercises rely on the following truncated files.
- NS-truncated (from Part 1)
- PAP-truncated
- Helios-truncated