Skip to Main content Skip to Navigation


...
tel-00636769v1  Habilitation à diriger des recherches
Steve Kremer. Modelling and analyzing security protocols in cryptographic process calculi
Computer Science [cs]. École normale supérieure de Cachan - ENS Cachan, 2011
...
hal-01351398v1  Conference papers
Myrto ArapinisVéronique CortierSteve Kremer. When are three voters enough for privacy properties?
21st European Symposium on Research in Computer Security, 2016, Heraklion, Crete, Greece
hal-01090766v1  Journal articles
Myrto ArapinisStéphanie DelauneSteve Kremer. Dynamic Tags for Security Protocols
Logical Methods in Computer Science, Logical Methods in Computer Science Association, 2014, 10 (2), pp.50. ⟨10.2168/LMCS-10(2:11)2014⟩
...
hal-01396291v1  Conference papers
Charlie JacommeSteve KremerGuillaume Scerri. Symbolic Models for Isolated Execution Environments
2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Apr 2017, Paris, France. ⟨10.1109/EuroSP.2017.16⟩
...
inria-00636734v1  Conference papers
Steve KremerGraham SteelBogdan Warinschi. Security for Key Management Interfaces
24th IEEE Computer Security Foundations Symposium (CSF'11), Jun 2011, Cernay-la-Ville, France. ⟨10.1109/CSF.2011.25⟩
...
inria-00636747v1  Conference papers
Stéphanie DelauneSteve KremerRyan MarkGraham Steel. Formal analysis of protocols based on TPM state registers
24th IEEE Computer Security Foundations Symposium (CSF'11), Jun 2011, Cernay-la-Ville, France. ⟨10.1109/CSF.2011.12⟩
inria-00108386v1  Conference papers
Véronique CortierSteve KremerRalf KuestersBogdan Warinschi. Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), Dec 2006, Kolkata, India
inria-00636787v1  Books
Véronique CortierSteve Kremer. Formal Models and Techniques for Analyzing Security Protocols
Cortier, Véronique and Kremer, Steve. IOS Press, 5, pp.312, 2011, Cryptology and Information Security Series, 978-1-60750-713-0
inria-00000555v1  Conference papers
Mathieu BaudetVéronique CortierSteve Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries
32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbonne/Portugal, pp.652-663, ⟨10.1007/11523468⟩
...
hal-01090874v1  Journal articles
Véronique CortierSteve Kremer. Formal Models and Techniques for Analyzing Security Protocols: A Tutorial
Foundations and Trends in Programming Languages, Now Publishers, 2014, 1 (3), pp.117. ⟨10.1561/2500000001⟩
...
hal-01091241v1  Conference papers
Steve KremerRobert Künnemann. Automated Analysis of Security Protocols with Global State
35th IEEE Symposium on Security and Privacy (S&P'14), May 2014, San Jose, United States. pp.163-178, ⟨10.1109/SP.2014.18⟩
hal-01090879v1  Directions of work or proceedings
Martin AbadiSteve Kremer. Principles of Security and Trust
Martín Abadi and Steve Kremer. 3rd International Conference on Principles of Security and Trust (POST'14), France. 8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. ⟨10.1007/978-3-642-54792-8⟩
...
hal-01103545v1  Conference papers
Véronique CortierFabienne EignerSteve KremerMatteo MaffeiCyrille Wiedling. Type-Based Verification of Electronic Voting Protocols
4th Conference on Principles of Security and Trust (POST), Apr 2015, London, United Kingdom
...
hal-01533708v1  Conference papers
David BaeldeStéphanie DelauneIvan GazeauSteve Kremer. Symbolic verification of privacy-type properties for security protocols with XOR
CSF 2017 - 30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, United States. pp.15
...
hal-01922022v1  Conference papers
Charlie JacommeSteve Kremer. An extensive formal analysis of multi-factor authentication protocols
CSF'2018 - 31st IEEE Computer Security Foundations Symposium, Jul 2018, Oxford, United Kingdom. ⟨10.1109/CSF.2018.00008⟩
...
hal-02404701v1  Conference papers
Gilles BartheBenjamin GrégoireCharlie JacommeSteve KremerPierre-Yves Strub. Symbolic Methods in Computational Cryptography Proofs
CSF2019 - 32nd IEEE Computer Security Foundations Symposium, Jun 2019, Hoboken, United States. pp.136-13615, ⟨10.1109/CSF.2019.00017⟩
...
hal-02552287v2  Reports
Gilles BartheCharlie JacommeSteve Kremer. Universal equivalence and majority of probabilistic programs over finite fields
[Research Report] MPI SP; LSV, ENS Cachan, CNRS, INRIA, Université Paris-Saclay, Cachan (France); LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy. 2020
...
hal-02961617v1  Conference papers
Vincent ChevalSteve KremerItsaka Rakotonirina. The hitchhiker's guide to decidability and complexity of equivalence properties in security protocols
Logic, Language, and Security. Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday, 2020, Philadelphia, United States
...
hal-00878632v1  Conference papers
Steve KremerRobert KünnemannGraham Steel. Universally Composable Key-Management
18th European Symposium on Research in Computer Security (ESORICS'13), 2013, Egham, United Kingdom. ⟨10.1007/978-3-642-40203-6_19⟩
...
hal-00878630v1  Conference papers
Myrto ArapinisVéronique CortierSteve KremerMark Ryan. Practical Everlasting Privacy
2nd Conferences on Principles of Security and Trust (POST'13), Mar 2013, Rome, Italy. pp.21-40, ⟨10.1007/978-3-642-36830-1_2⟩