Publications

Note: If you are looking for a paper by 'Guttman and Herzog' (or vice-versa) and do not see it here, it is likely that the Herzog in question is my wife Amy Herzog. You will probably find the paper on Joshua Guttman's page.

In Press
Canetti, Ran, and Jonathan Herzog. "Universally Composable Symbolic Analysis of Mutual Authentication and Key Exchange Protocols." Journal of Cryptology (In Press).
2009
Herzog, Jonathan, Jonathan Millen, Brian O'Hanlon, John D. Ramsdell, and Ariel Segall. Using Attestation to Lift Crash Resilience to Byzantine Resilience In MITRE Technical Report. Bedford, MA: The MITRE Corporation, 2009. Abstract
Canright, David, George Dinolt, Simson Garfinkel, Jonathan Herzog, and Bruce Allen. Implementing AES on the CellBE. Monterey, CA: Naval Postgraduate School, 2009. Abstract
Adao, Pedro, Gergei Bana, Jonathan Herzog, and Andre Scedrov. "Soundness and Completeness of Formal Encryption: the Cases of Key-Cycles and Partial Information Leakage." Journal of Computer Security 7, no. 5 (2009): 737-797. Abstract
2006
Canetti, Ran, and Jonathan Herzog. "Universally Composable Symbolic Analysis of Mutual Authentication and Key Exchange Protocols." In Proceedings, Theory of Cryptography Conference (TCC)., 2006. Abstract
Herzog, Jonathan. "Applying protocol analysis to secuirity device interfaces." IEEE Security and Privacy 4 (2006): 84-87.
2005
Adao, Pedro, Gergei Bana, Jonathan Herzog, and Andre Scedrov. "Soundness of Abadi-Rogaway Logics in the Presence of Key-Cycles." In Proceedings of the 10th European Symposium On Research In Computer Security (ESORICS 2005). Springer, 2005. Abstract
Herzog, Jonathan. "A Computational Interpretation of Dolev-Yao Adversaries." Theoretical Computer Science 340 (2005): 57-81. Abstract
Guttman, Joshua D., Jonathan Herzog, John D. Ramsdell, and Brian T. Sniffen. "Programming Cryptographic Protocols." In Trustworthy Global Computing (TGC 2005), edited by Rocco Nicola and Davide Sangiorgi, 116-145. Vol. 3702. Springer-Verlag GmbH, 2005. Abstract
2004
Herzog, Jonathan. Computational Soundness for Standard Assumptions of Formal Cryptography In Department of Electrical Engineering and Computer Science. Vol. Doctor of Philosophy. Cambridge, MA: Massachusetts Institute of Technology, 2004. Abstract
Guttman, Joshua D., Javier F. Thayer, Jay A. Carlson, Jonathan Herzog, John D. Ramsdell, and Brian T. Sniffen. "Trust Management in Strand Spaces: A Rely-Guarantee Method." In Programming Languages and Systems: 13th European Symposium on Programming, edited by David Schmidt, 325-339. LNCS. Springer, 2004. Abstract
2003
Herzog, Jonathan. "The Diffie-Hellman Key-Agreement Scheme in the Strand-Space Model." In 16th Computer Security Foundations Workshop (CSFW), 234-247. Asilomar, CA: IEEE CS Press, 2003. Abstract
Herzog, Jonathan, Moses Liskov, and Silvio Micali. "Plaintext Awareness via Key Registration." In Advances in Cryptology - CRYPTO 2003, edited by Dan Boneh, 548-564. Vol. 2729. Lecture Notes in Computer Science 2729. Santa Barbara, CA: Springer-Verlag, 2003. Abstract
Herzog, Jonathan. "A Computational Interpretation of Dolev-Yao Adversaries." In Proceedings, Workship on Issues in the Theory of Security (WITS'03), edited by Roberto Gorrieri, 146-155., 2003. Abstract
2001
Herzog, Jonathan. Secure Internet Protocol Analysis Conclusions. The MITRE Corporation, 2001.
2000
Herzog, Jonathan. Mobile IP security. The MITRE Corporation, 2000.
Herzog, Jonathan, Laura Feinstein, and Joshua D. Guttman. A strand-space analysis of TLS 1.0. The MITRE Corporation, 2000.
Herzog, Jonathan. Some security concerns regarding PPP-EAP-TLS. The MITRE Corporation, 2000.
1999
Fábrega, Javier THAYER F., Jonathan Herzog, and Joshua D. Guttman. "Mixed Strand Spaces." In Proceedings of the 12th IEEE Computer Security Foundations Workshop (CSFW). IEEE Computer Society Press, 1999. Abstract
Chase, Fred, and Jonathan Herzog. The Secure DNS protocols. The MITRE Corporation, 1999.
Herzog, Jonathan, Joshua D. Guttman, and Fred Chase. A strand space analysis of the SSH version 2 protocol. The MITRE Corporation, 1999.
Herzog, Jonathan, Fred Chase, and Joshua D. Guttman. A saying-logic analysis of core DNS Security. The MITRE Corporation, 1999.
Thayer, Javier F., Jonathan Herzog, and Joshua D. Guttman. "Strand Spaces: Proving Security Protocols Correct." Journal of Computer Security 7 (1999): 191-230. Abstract
1998
Berkovitz, Shimshon, and Jonathan Herzog. A comparison of certificate validation methods for use in a web environment. The MITRE Corporation, 1998.
Fábrega, Javier THAYER F., Jonathan Herzog, and Joshua D. Guttman. "Strand Spaces: Why is a Security Protocol Correct?" In 1998 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1998. Abstract
Fábrega, Javier THAYER F., Jonathan Herzog, and Joshua D. Guttman. "Honest Ideals on Strand Spaces." In Proceedings of the 11th IEEE Computer Security Foundations Workshop (CSFW). IEEE Computer Society Press, 1998. Abstract
Fabrega, Javier Thayer F., Jonathan Herzog, and Joshua D. Guttman. "Strand Space Pictures." In Proceedings, Workshop on Formal Methods and Security Protocols., 1998. Abstract
Herzog, Jonathan, Christopher McLaren, and Anant Godbole. "Generalized k-matches." Statistics and Probability Letters 38 (1998): 167-175. Abstract
1997
Herzog, Jonathan, Erin Conley, and Everett Bull. Formal Methods Applied to Spacecraft Subsystems. Harvey Mudd College, 1997.
1995
Grunwald, Ernest, Jonathan Herzog, and Colin Steel. "Using Fourier Transforms to Understand Spectral Line Shapes." Journal of Chemical Education 72 (1995): 210-214.