Using logics to detect implementation-dependent flaws [cryptographic protocol design] | IEEE Conference Publication | IEEE Xplore