Skip to Main content Skip to Navigation


inria-00108398v1  Conference papers
Véronique CortierGraham Steel. On the Decidability of a Class of XOR-based Key-management APIs
Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'06), Aug 2006, Seattle, Washington
inria-00181612v1  Conference papers
Véronique CortierStéphanie DelauneGraham Steel. A Formal Theory of Key Conjuring.
20th IEEE Computer Security Foundations Symposium - CSF'07, Jul 2007, Venice, Italy. pp.79-96
inria-00181616v1  Conference papers
Véronique CortierKeighren GavinGraham Steel. Automatic Analysis of the Security of XOR-based Key Management Schemes.
13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'07),, Mar 2007, Braga, Portugal. pp.538-552
...
hal-01351398v1  Conference papers
Myrto ArapinisVéronique CortierSteve Kremer. When are three voters enough for privacy properties?
21st European Symposium on Research in Computer Security, 2016, Heraklion, Crete, Greece
...
inria-00129642v2  Reports
Véronique CortierStéphanie DelauneGraham Steel. A Formal Theory of Key Conjuring
[Research Report] RR-6134, INRIA. 2007, pp.38
...
hal-03446801v1  Reports
Véronique CortierAlexandre DebantPierrick Gaudry. A privacy attack on the Swiss Post e-voting system
[Research Report] Université de Lorraine, CNRS, Inria, LORIA. 2021
...
hal-01377917v1  Conference papers
Pyrros ChaidosVéronique CortierGeorg FuchsbauerDavid Galindo. BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme
23rd ACM Conference on Computer and Communications Security (CCS'16), Oct 2016, Vienna, Austria. ⟨10.1145/2976749.2978337⟩
...
inria-00000552v1  Journal articles
Véronique CortierStéphanie DelaunePascal Lafourcade. A Survey of Algebraic Properties Used in Cryptographic Protocols
Journal of Computer Security, IOS Press, 2006, 14 (1), pp.1-43
inria-00108386v1  Conference papers
Véronique CortierSteve KremerRalf KuestersBogdan Warinschi. Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), Dec 2006, Kolkata, India
inria-00638515v1  Journal articles
Mouhebeddine BerrimaNarjes Ben RajebVéronique Cortier. Deciding knowledge in security protocols under some e-voting theories
RAIRO - Theoretical Informatics and Applications (RAIRO: ITA), EDP Sciences, 2011, 45 (3), pp.269-299. ⟨10.1051/ita/2011119⟩
inria-00426626v1  Conference papers
Mathilde ArnaudVéronique CortierStéphanie Delaune. Modeling and Verifying Ad Hoc Routing Protocol
4th International Workshop on Security and Rewriting Techniques - SecReT'09, Jul 2009, Port Jefferson, United States. pp.33-46
inria-00638557v1  Conference papers
Mathilde ArnaudVéronique CortierStéphanie Delaune. Deciding security for protocols with recursive tests
23rd International Conference on Automated Deduction (CADE'11), Aug 2011, Wroclaw, Poland. pp.49-63, ⟨10.1007/978-3-642-22438-6_6⟩
...
inria-00091656v1  Conference papers
Véronique Cortier. Verification of cryptographic protocols: techniques and link to cryptanalysis
Sixth International Workshop on Automatic Verification of Critical Systems - AVOCS'06, Sep 2006, Nancy/France
hal-00881023v1  Conference papers
Florian BoehlVéronique CortierBogdan Warinschi. Deduction Soundness: Prove One, Get Five for Free
CCS '13 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security - 2013, Nov 2013, Berlin, Germany. pp.1261-1272, ⟨10.1145/2508859.2516711⟩
hal-01238163v1  Conference papers
Rémy ChrétienVéronique CortierStéphanie Delaune. Checking Trace Equivalence: How to Get Rid of Nonces?
ESORICS 2015 - 20th European Symposium on Research in Computer Security, Sep 2015, Vienne, Austria. ⟨10.1007/978-3-319-24177-7_12⟩
...
tel-00578816v1  Habilitation à diriger des recherches
Véronique Cortier. Analyse des protocoles cryptographiques: des modèles symboliques aux modèles calculatoires
Informatique [cs]. Institut National Polytechnique de Lorraine - INPL, 2009
inria-00108408v1  Journal articles
Véronique Cortier. Divers protocoles couramment utilisés en informatique
Bibliothèque Tangente, Editions Pôle Paris, 2006
inria-00181620v1  Conference papers
Véronique CortierStéphanie Delaune. Deciding knowledge in security protocols for monoidal equational theories.
Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis - FCS-ARSPA'07, Jul 2007, Wrocław, Poland
inria-00181622v1  Conference papers
Véronique CortierRalf KuestersBogdan Warinschi. A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols.
3rd Workshop on Formal and Computational Cryptography - FCC 2007, Jul 2007, Venise, Italy
inria-00108391v1  Conference papers
Véronique CortierMichaël RusinowitchEugen Zalinescu. Relating two standard notions of secrecy
Proc. of the 20th Int. Conference Computer Science Logic (CSL'06), Sep 2006, Szeged, Hungary
hal-01080292v1  Conference papers
Véronique CortierDavid GalindoStéphane GlonduMalika Izabachène. Election Verifiability for Helios under Weaker Trust Assumptions
Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS'14), Sep 2014, Wroclaw, Poland
inria-00636787v1  Books
Véronique CortierSteve Kremer. Formal Models and Techniques for Analyzing Security Protocols
Cortier, Véronique and Kremer, Steve. IOS Press, 5, pp.312, 2011, Cryptology and Information Security Series, 978-1-60750-713-0
inria-00638552v1  Conference papers
Véronique CortierBogdan Warinschi. A Composable Computational Soundness Notion
18th ACM Conference on Computer and Communications Security - CSS 2011, Oct 2011, Chicago, United States. pp.63-74, ⟨10.1145/2046707.2046717⟩