Steve Kremer
Orcid: 0009-0004-6946-0678Affiliations:
- INRIA Nancy - Grand Est, France
- ENS Cachan, Paris, France (former)
According to our database1,
Steve Kremer
authored at least 86 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
DeepSec: Deciding Equivalence Properties for Security Protocols - Improved theory and practice.
TheoretiCS, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
ACM Trans. Comput. Log., 2022
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
IACR Cryptol. ePrint Arch., 2022
Symbolic protocol verification with dice: process equivalences in the presence of probabilities.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
2021
ACM Trans. Priv. Secur., 2021
2020
J. Comput. Secur., 2020
The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols.
Proceedings of the Logic, 2020
2019
Contingent payments on a public ledger: models and reductions for automated verification.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Computer Aided Verification - 30th International Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Automated Analysis of Equivalence Properties for Security Protocols Using Else Branches.
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
2016
Proceedings of the Dependable Software Systems Engineering, 2016
ACM Trans. Comput. Log., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
Inf. Comput., 2014
Found. Trends Program. Lang., 2014
2013
Proceedings of the Principles of Security and Trust - Second International Conference, 2013
2012
J. Autom. Reason., 2012
J. Autom. Reason., 2012
Proceedings of the Programming Languages and Systems, 2012
Proceedings of the Automated Reasoning - 6th International Joint Conference, 2012
2011
J. Autom. Reason., 2011
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
J. Comput. Secur., 2010
J. Comput. Secur., 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010
Proceedings of the Computer Security, 2010
2009
J. Comput. Secur., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Formal Techniques for Distributed Systems, 2009
2008
Proceedings of the Logic for Programming, 2008
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
Proceedings of the Automated Reasoning, 4th International Joint Conference, 2008
2007
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
2005
Computationally sound implementations of equational theories against passive adversaries.
IACR Cryptol. ePrint Arch., 2005
Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model.
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Programming Languages and Systems, 2005
2004
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks.
Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, 2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
2003
J. Comput. Secur., 2003
Proceedings of the Information Security and Cryptology, 2003
2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002
2001
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Progress in Cryptology, 2001
2000
A Multi-Party Non-Repudiation Protocol.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Information Security and Cryptology, 2000