European Commission logo
polski polski
CORDIS - Wyniki badań wspieranych przez UE
CORDIS

Automated Security Proofs of Cryptographic Protocols: Privacy, Untrusted Platforms and Applications to E-voting Protocols

Publikacje

Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols

Autorzy: Veronique Cortier, Stephanie Delaune, Jannik Dreier
Opublikowane w: Computer Security – ESORICS 2020, 2020
Wydawca: Springer
DOI: 10.1007/978-3-030-59013-0_1

The hitchhiker's guide to decidability and complexity of equivalence properties in security protocols.

Autorzy: Vincent Cheval, Steve Kremer, Itsaka Rakotonirina
Opublikowane w: In Logic, Language, and Security. Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday, 2020
Wydawca: Springer

Universal equivalence and majority of probabilistic programs over finite fields

Autorzy: Gilles Barthe, Charlie Jacomme, Steve Kremer
Opublikowane w: Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science, 2020, Strona(/y) 155-166, ISBN 9781450371049
Wydawca: ACM
DOI: 10.1145/3373718.3394746

SAT-Equiv: An Efficient Tool for Equivalence Properties

Autorzy: Veronique Cortier, Antoine Dallon, Stephanie Delaune
Opublikowane w: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 2017, Strona(/y) 481-494, ISBN 978-1-5386-3217-8
Wydawca: IEEE
DOI: 10.1109/CSF.2017.15

On communication models when verifying equivalence properties

Autorzy: Babel , Kushal; Cheval , Vincent; Kremer , Steve
Opublikowane w: 6th International Conference on Principles of Security and Trust (POST), Apr 2017, Uppsala, Sweden, Numer 3, 2017
Wydawca: Springer
DOI: 10.1007/978-3-662-54455-6_7

A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange

Autorzy: Michael Backes, Jannik Dreier, Steve Kremer, Robert Kunnemann
Opublikowane w: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017, Strona(/y) 76-91, ISBN 978-1-5090-5762-7
Wydawca: IEEE
DOI: 10.1109/EuroSP.2017.12

DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice,

Autorzy: Vincent Cheval, Steve Kremer, Itsaka Rakotonirina
Opublikowane w: 2018 IEEE Symposium on Security and Privacy (SP), 2018
Wydawca: IEEE

Notions of Knowledge in Combinations of Theories Sharing Constructors

Autorzy: Serdar Erbatur, Andrew M. Marshall, Christophe Ringeissen
Opublikowane w: 26th International Conference on Automated Deduction (CADE'17), 2017, Strona(/y) 60-76
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-319-63046-5_5

Machine-Checked Proofs of Privacy for Electronic Voting Protocols

Autorzy: Veronique Cortier, Constantin Catalin Dragan, Francois Dupressoir, Benedikt Schmidt, Pierre-Yves Strub, Bogdan Warinschi
Opublikowane w: 2017 IEEE Symposium on Security and Privacy (SP), 2017, Strona(/y) 993-1008, ISBN 978-1-5090-5533-3
Wydawca: IEEE
DOI: 10.1109/SP.2017.28

Formal Verification of Protocols Based on Short Authenticated Strings

Autorzy: Stephanie Delaune, Steve Kremer, Ludovic Robin
Opublikowane w: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 2017, Strona(/y) 130-143, ISBN 978-1-5386-3217-8
Wydawca: IEEE
DOI: 10.1109/CSF.2017.26

Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR

Autorzy: David Baelde, Stephanie Delaune, Ivan Gazeau, Steve Kremer
Opublikowane w: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 2017, Strona(/y) 234-248, ISBN 978-1-5386-3217-8
Wydawca: IEEE
DOI: 10.1109/CSF.2017.22

Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols

Autorzy: Dreier , Jannik; Duménil , Charles; Kremer , Steve; Sasse , Ralf
Opublikowane w: "POST 2017 - 6th International Conference on Principles of Security and Trust, Apr 2017, Uppsala, Sweden. Springer, Security and Cryptology, 10204, pp.117-140, Principles of Security and Trust. 〈http://www.etaps.org/2017/post〉", Numer 3, 2017
Wydawca: Springer
DOI: 10.1007/978-3-662-54455-6_6

Automated analysis of equivalence properties for security protocols using else branches

Autorzy: Gazeau , Ivan; Kremer , Steve
Opublikowane w: 22nd European Symposium on Research in Computer Security (ESORICS'17), 2017, Oslo, Norway. Springer, 2017, Numer 14, 2017
Wydawca: Springer

Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices

Autorzy: Veronique Cortier, Alicia Filipiak, Jan Florent, Said Gharout, Jacques Traore
Opublikowane w: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017, Strona(/y) 467-480, ISBN 978-1-5090-5762-7
Wydawca: IEEE
DOI: 10.1109/EuroSP.2017.19

Secure Composition of PKIs with Public Key Protocols

Autorzy: Vincent Cheval, Veronique Cortier, Bogdan Warinschi
Opublikowane w: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 2017, Strona(/y) 144-158, ISBN 978-1-5386-3217-8
Wydawca: IEEE
DOI: 10.1109/CSF.2017.28

A Type System for Privacy Properties

Autorzy: Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei
Opublikowane w: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Strona(/y) 409-423, ISBN 9781-450349468
Wydawca: ACM Press
DOI: 10.1145/3133956.3133998

The DEEPSEC prover

Autorzy: Vincent Cheval, Steve Kremer, Itsaka Rakotonirina
Opublikowane w: 30th International Conference on Computer Aided Verification, Part II (CAV'18), 2018, Strona(/y) 28-36
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-319-96142-2_4

Equivalence properties by typing in cryptographic branching protocols

Autorzy: Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei
Opublikowane w: 7th International Conference on Principles of Security and Trust (POST'18), 2018, Strona(/y) 160-187
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-319-89722-6_7

An Extensive Formal Analysis of Multi-factor Authentication Protocols

Autorzy: Charlie Jacomme, Steve Kremer
Opublikowane w: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 2018, Strona(/y) 1-15, ISBN 978-1-5386-6680-7
Wydawca: IEEE
DOI: 10.1109/CSF.2018.00008

A Formal Analysis of the Neuchatel e-Voting Protocol

Autorzy: Veronique Cortier, David Galindo, Mathieu Turuani
Opublikowane w: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Strona(/y) 430-442, ISBN 978-1-5386-4228-3
Wydawca: IEEE
DOI: 10.1109/EuroSP.2018.00037

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR

Autorzy: Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse
Opublikowane w: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 2018, Strona(/y) 359-373, ISBN 978-1-5386-6680-7
Wydawca: IEEE
DOI: 10.1109/CSF.2018.00033

Efficiently deciding equivalence for standard primitives and phases

Autorzy: Véronique Cortier, Antoine Dallon, Stéphanie Delaune
Opublikowane w: Proceedings of the 23rd European Symposium on Research in Computer Security, Part I (ESORICS'18), 2018, Strona(/y) 491-511
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-319-99073-6_24

A Little More Conversation, a Little Less Action, a Lot More Satisfaction: Global States in ProVerif

Autorzy: Vincent Cheval, Veronique Cortier, Mathieu Turuani
Opublikowane w: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 2018, Strona(/y) 344-358, ISBN 978-1-5386-6680-7
Wydawca: IEEE
DOI: 10.1109/CSF.2018.00032

Machine-Checked Proofs for Electronic Voting: Privacy and Verifiability for Belenios

Autorzy: Veronique Cortier, Constantin Catalin Dragan, Francois Dupressoir, Bogdan Warinschi
Opublikowane w: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 2018, Strona(/y) 298-312, ISBN 978-1-5386-6680-7
Wydawca: IEEE
DOI: 10.1109/CSF.2018.00029

To Du or Not to Du: A Security Analysis of Du-Vote

Autorzy: Steve Kremer, Peter B. Ronne
Opublikowane w: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), Numer annual, 2016, Strona(/y) 473-486, ISBN 978-1-5090-1752-2
Wydawca: IEEE
DOI: 10.1109/EuroSP.2016.42

BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme

Autorzy: Cortier, Véronique; Galindo, David; Chaidos, Pyrros; Fuchsbauer, Georg
Opublikowane w: 23rd ACM Conference on Computer and Communications Security (CCS'16), Oct 2016, Vienna, Austria. 2016, <10.1145/2976749.2978337>, Numer annual, 2016
Wydawca: ACM
DOI: 10.1145/2976749.2978337

Symbolic Models for Isolated Execution Environments

Autorzy: Scerri, Guillaume; Kremer, Steve; Jacomme, Charlie
Opublikowane w: 2nd IEEE European Symposium on Security and Privacy (EuroSP'17), Apr 2017, Paris, France, Numer annual, 2017
Wydawca: Springer

When Are Three Voters Enough for Privacy Properties?

Autorzy: Kremer, Steve; Cortier, Véronique; Arapinis, Myrto
Opublikowane w: Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II . Lecture Notes in Computer Science , vol. 9879 , Springer International Publishing , pp. 241-260 . DOI: 10.1007/978-3-319-45741-3_13, Numer annual, 2016
Wydawca: Springer
DOI: 10.1007/978-3-319-45741-3_13

Automated Verification of Electrum Wallet

Autorzy: Voegtlin, Thomas; Turuani, Mathieu; Rusinowitch, Michael
Opublikowane w: 3rd Workshop on Bitcoin and Blockchain Research, Numer annual, 2016
Wydawca: Springer
DOI: 10.1007/978-3-662-53357-4_3

BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device

Autorzy: Veronique Cortier, Alicia Filipiak, Joseph Lallemand
Opublikowane w: 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 2019, Strona(/y) 367-36714, ISBN 978-1-7281-1407-1
Wydawca: IEEE
DOI: 10.1109/csf.2019.00032

Exploiting Symmetries When Proving Equivalence Properties for Security Protocols

Autorzy: Vincent Cheval, Steve Kremer, Itsaka Rakotonirina
Opublikowane w: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Strona(/y) 905-922, ISBN 9781-450367479
Wydawca: ACM
DOI: 10.1145/3319535.3354260

Symbolic Methods in Computational Cryptography Proofs

Autorzy: Gilles Barthe, Benjamin Gregoire, Charlie Jacomme, Steve Kremer, Pierre-Yves Strub
Opublikowane w: 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 2019, Strona(/y) 136-13615, ISBN 978-1-7281-1407-1
Wydawca: IEEE
DOI: 10.1109/CSF.2019.00017

Voting - You Can't Have Privacy without Individual Verifiability

Autorzy: Véronique Cortier, Joseph Lallemand
Opublikowane w: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, Strona(/y) 53-66, ISBN 9781-450356930
Wydawca: ACM
DOI: 10.1145/3243734.3243762

Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme

Autorzy: Sergiu Bursuc, Constantin-Catalin Dragan, Steve Kremer
Opublikowane w: 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Strona(/y) 606-620, ISBN 978-1-7281-1148-3
Wydawca: IEEE
DOI: 10.1109/eurosp.2019.00050

A Formal Analysis of 5G Authentication

Autorzy: David Basin, Jannik Dreier, Lucca Hirschi, Saša Radomirovic, Ralf Sasse, Vincent Stettler
Opublikowane w: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, Strona(/y) 1383-1396, ISBN 9781-450356930
Wydawca: ACM
DOI: 10.1145/3243734.3243846

DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice

Autorzy: Vincent Cheval, Steve Kremer, Itsaka Rakotonirina
Opublikowane w: 2018 IEEE Symposium on Security and Privacy (SP), 2018, Strona(/y) 529-546, ISBN 978-1-5386-4353-2
Wydawca: IEEE
DOI: 10.1109/sp.2018.00033

Fifty Shades of Ballot Privacy: Privacy against a Malicious Board

Autorzy: Veronique Cortier, Joseph Lallemand, Bogdan Warinschi
Opublikowane w: 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 2020, Strona(/y) 17-32, ISBN 978-1-7281-6572-1
Wydawca: IEEE
DOI: 10.1109/csf49147.2020.00010

On the semantics of communications when verifying equivalence properties

Autorzy: Kushal Babel, Vincent Cheval, Steve Kremer
Opublikowane w: Journal of Computer Security, Numer 28/1, 2020, Strona(/y) 71-127, ISSN 0926-227X
Wydawca: IOS Press
DOI: 10.3233/jcs-191366

Automated verification of equivalence properties of cryptographic protocols

Autorzy: Kremer, Steve; Ciobâcǎ, Ştefan; Chadha, Rohit; Cheval, Vincent
Opublikowane w: ACM Transactions on Computational Logic (TOCL), Numer Volume 17 Numer 4, 2016, Strona(/y) 1--32, ISSN 1529-3785
Wydawca: Association for Computing Machinary, Inc.
DOI: 10.1145/2926715

Automated analysis of security protocols with global state

Autorzy: Steve Kremer, Robert Künnemann
Opublikowane w: Journal of Computer Security, Numer 24/5, 2016, Strona(/y) 583-616, ISSN 0926-227X
Wydawca: IOS Press
DOI: 10.3233/JCS-160556

Typing Messages for Free in Security Protocols

Autorzy: Rémy Chrétien, Véronique Cortier, Antoine Dallon, Stéphanie Delaune
Opublikowane w: ACM Transactions on Computational Logic, Numer 21/1, 2020, Strona(/y) 1-52, ISSN 1529-3785
Wydawca: Association for Computing Machinary, Inc.
DOI: 10.1145/3343507

Rule-Based Unification in Combined Theories and the Finite Variant Property

Autorzy: Ajay K. Eeralla, Serdar Erbatur, Andrew M. Marshall, Christophe Ringeissen
Opublikowane w: Language and Automata Theory and Applications - 13th International Conference, LATA 2019, St. Petersburg, Russia, March 26-29, 2019, Proceedings, Numer 11417, 2019, Strona(/y) 356-367, ISBN 978-3-030-13434-1
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-030-13435-8_26

Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification

Autorzy: Sergiu Bursuc, Steve Kremer
Opublikowane w: Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I, Numer 11735, 2019, Strona(/y) 361-382, ISBN 978-3-030-29958-3
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-030-29959-0_18

Wyszukiwanie danych OpenAIRE...

Podczas wyszukiwania danych OpenAIRE wystąpił błąd

Brak wyników