—
Coverage × Correctness × Reproducibility — from high-level intent to implementation artifacts, across five model capabilities.
ProVerif, Tamarin, Scyther, Maude-NPA, AVISPA, CryptoVerif, EasyCrypt — cross-tool verification for robust conclusions.
From protocol goals/assumptions to implementation-level artifacts (e.g., Jasmin/constant-time checks), end-to-end coverage.
Interpretation / Generation/ Completion / Transformation / Correction — not just “write”, but “verify”.
Curated end-to-end from design intent to implementation, covering protocols/schemes, security properties (secrecy, auth, integrity, freshness, PFS, IND-CPA/CCA, equivalence), adversary models (Dolev–Yao, state/ephemeral leaks, CK/eCK).
Fully scriptable & CI-friendly; scoring formulas and weights are configurable.
Use scripts/cfb.sh
to reproduce results and figures locally in one go.
—
—
—
—
—
Can’t play inline? Open in a new tab or Download the video.