Steve Kremer

Orcid: 0009-0004-6946-0678

Affiliations:
  • INRIA Nancy - Grand Est, France
  • ENS Cachan, Paris, France (former)


According to our database1, Steve Kremer authored at least 86 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DeepSec: Deciding Equivalence Properties for Security Protocols - Improved theory and practice.
TheoretiCS, 2024

DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Security and Privacy Column.
ACM SIGLOG News, January, 2023

Symbolic protocol verification with dice.
J. Comput. Secur., 2023

DY Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing.
IACR Cryptol. ePrint Arch., 2023

A comprehensive, formal and automated analysis of the EDHOC protocol.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Universal Equivalence and Majority of Probabilistic Programs over Finite Fields.
ACM Trans. Comput. Log., 2022

Sapic+: protocol verifiers of the world, unite!
IACR Cryptol. ePrint Arch., 2022

Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
IACR Cryptol. ePrint Arch., 2022

Symbolic protocol verification with dice: process equivalences in the presence of probabilities.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

2021
An Extensive Formal Analysis of Multi-factor Authentication Protocols.
ACM Trans. Priv. Secur., 2021

2020
On the semantics of communications when verifying equivalence properties.
J. Comput. Secur., 2020

The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols.
Proceedings of the Logic, 2020

2019
Contingent payments on a public ledger: models and reductions for automated verification.
IACR Cryptol. ePrint Arch., 2019

Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Symbolic Methods in Computational Cryptography Proofs.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

Exploiting Symmetries When Proving Equivalence Properties for Security Protocols.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

The DEEPSEC Prover.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018

2017
Symbolic Models for Isolated Execution Environments.
IACR Cryptol. ePrint Arch., 2017

Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

On Communication Models When Verifying Equivalence Properties.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Automated Analysis of Equivalence Properties for Security Protocols Using Else Branches.
Proceedings of the Computer Security - ESORICS 2017, 2017

Formal Verification of Protocols Based on Short Authenticated Strings.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
Formal Models for Analyzing Security Protocols: Some Lecture Notes.
Proceedings of the Dependable Software Systems Engineering, 2016

Automated Verification of Equivalence Properties of Cryptographic Protocols.
ACM Trans. Comput. Log., 2016

Automated analysis of security protocols with global state.
J. Comput. Secur., 2016

When Are Three Voters Enough for Privacy Properties?
IACR Cryptol. ePrint Arch., 2016

To Du or Not to Du: A Security Analysis of Du-Vote.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

2015
Type-Based Verification of Electronic Voting Protocols.
IACR Cryptol. ePrint Arch., 2015

2014
Foreword to the special issue on security and rewriting techniques.
Inf. Comput., 2014

Formal Models and Techniques for Analyzing Security Protocols: A Tutorial.
Found. Trends Program. Lang., 2014

Dynamic Tags for Security Protocols.
Log. Methods Comput. Sci., 2014

2013
Composition of password-based protocols.
Formal Methods Syst. Des., 2013

Practical Everlasting Privacy.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

2012
Reducing Equational Theories for the Decision of Static Equivalence.
J. Autom. Reason., 2012

Computing Knowledge in Security Protocols Under Convergent Equational Theories.
J. Autom. Reason., 2012

Universally Composable Key-Management.
IACR Cryptol. ePrint Arch., 2012

Automated Verification of Equivalence Properties of Cryptographic Protocols.
Proceedings of the Programming Languages and Systems, 2012

Security Protocols, Constraint Systems, and Group Theories.
Proceedings of the Automated Reasoning - 6th International Joint Conference, 2012

2011
A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems.
J. Autom. Reason., 2011

Transforming Password Protocols to Compose.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2011

Security for Key Management Interfaces.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Formal Analysis of Protocols Based on TPM State Registers.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Introduction.
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011

Modelling and analyzing security protocols in cryptographic process calculi.
, 2011

2010
Computationally sound analysis of protocols using bilinear pairings.
J. Comput. Secur., 2010

Formal security analysis of PKCS#11 and proprietary extensions.
J. Comput. Secur., 2010

Symbolic bisimulation for the applied pi calculus.
J. Comput. Secur., 2010

Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Towards Automatic Analysis of Election Verifiability Properties.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

A Formal Analysis of Authentication in the TPM.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010

Election Verifiability in Electronic Voting Protocols.
Proceedings of the Computer Security, 2010

2009
Verifying privacy-type properties of electronic voting protocols.
J. Comput. Secur., 2009

Simulation based security in the applied pi calculus.
IACR Cryptol. ePrint Arch., 2009

Epistemic Logic for the Applied Pi Calculus.
Proceedings of the Formal Techniques for Distributed Systems, 2009

2008
Preface.
Proceedings of the 6th Workshop on Security Issues in Concurrency, 2008

From One Session to Many: Dynamic Tags for Security Protocols.
Proceedings of the Logic for Programming, 2008

Formal Analysis of PKCS#11.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

Composition of Password-Based Protocols.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

Proving Group Protocols Secure Against Eavesdroppers.
Proceedings of the Automated Reasoning, 4th International Joint Conference, 2008

2007
Computational Soundness of Equational Theories (Tutorial).
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007

Adaptive Soundness of Static Equivalence.
Proceedings of the Computer Security, 2007

07421 Abstracts Collection -- Formal Protocol Verification Applied.
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007

07421 Executive Summary -- Formal Protocol Verification Applied.
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007

2006
Juggling with Pattern Matching.
Theory Comput. Syst., 2006

Formal Analysis of Multiparty Contract Signing.
J. Autom. Reason., 2006

Computationally Sound Symbolic Secrecy in the Presence of Hash Functions.
IACR Cryptol. ePrint Arch., 2006

Coercion-Resistance and Receipt-Freeness in Electronic Voting.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005
Computationally sound implementations of equational theories against passive adversaries.
IACR Cryptol. ePrint Arch., 2005

Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model.
Proceedings of the Financial Cryptography and Data Security, 2005

Analysis of an Electronic Voting Protocol in the Applied Pi Calculus.
Proceedings of the Programming Languages and Systems, 2005

2004
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks.
Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, 2004

Formal Analysis of Multi-Party Contract Signing.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
A Game-based Verification of Non-repudiation and Fair Exchange Protocols.
J. Comput. Secur., 2003

Fair multi-party non-repudiation protocols.
Int. J. Inf. Sec., 2003

An Efficient Strong Designated Verifier Signature Scheme.
Proceedings of the Information Security and Cryptology, 2003

2002
An intensive survey of fair non-repudiation protocols.
Comput. Commun., 2002

On Fairness in Exchange Protocols.
Proceedings of the Information Security and Cryptology, 2002

Game Analysis of Abuse-free Contract Signing.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party.
Proceedings of the Information Security, 4th International Conference, 2001

Selective Receipt in Certified E-mail.
Proceedings of the Progress in Cryptology, 2001

2000
A Multi-Party Non-Repudiation Protocol.
Proceedings of the Information Security for Global Information Infrastructures, 2000

A Multi-party Optimistic Non-repudiation Protocol.
Proceedings of the Information Security and Cryptology, 2000


  Loading...