Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Automated Security Proofs of Cryptographic Protocols: Privacy, Untrusted Platforms and Applications to E-voting Protocols

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols

Author(s): Veronique Cortier, Stephanie Delaune, Jannik Dreier
Published in: Computer Security – ESORICS 2020, 2020
Publisher: Springer
DOI: 10.1007/978-3-030-59013-0_1

The hitchhiker's guide to decidability and complexity of equivalence properties in security protocols.

Author(s): Vincent Cheval, Steve Kremer, Itsaka Rakotonirina
Published in: In Logic, Language, and Security. Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday, 2020
Publisher: Springer

Universal equivalence and majority of probabilistic programs over finite fields

Author(s): Gilles Barthe, Charlie Jacomme, Steve Kremer
Published in: Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science, 2020, Page(s) 155-166, ISBN 9781450371049
Publisher: ACM
DOI: 10.1145/3373718.3394746

SAT-Equiv: An Efficient Tool for Equivalence Properties

Author(s): Veronique Cortier, Antoine Dallon, Stephanie Delaune
Published in: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 2017, Page(s) 481-494, ISBN 978-1-5386-3217-8
Publisher: IEEE
DOI: 10.1109/CSF.2017.15

On communication models when verifying equivalence properties

Author(s): Babel , Kushal; Cheval , Vincent; Kremer , Steve
Published in: 6th International Conference on Principles of Security and Trust (POST), Apr 2017, Uppsala, Sweden, Issue 3, 2017
Publisher: Springer
DOI: 10.1007/978-3-662-54455-6_7

A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange

Author(s): Michael Backes, Jannik Dreier, Steve Kremer, Robert Kunnemann
Published in: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017, Page(s) 76-91, ISBN 978-1-5090-5762-7
Publisher: IEEE
DOI: 10.1109/EuroSP.2017.12

DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice,

Author(s): Vincent Cheval, Steve Kremer, Itsaka Rakotonirina
Published in: 2018 IEEE Symposium on Security and Privacy (SP), 2018
Publisher: IEEE

Notions of Knowledge in Combinations of Theories Sharing Constructors

Author(s): Serdar Erbatur, Andrew M. Marshall, Christophe Ringeissen
Published in: 26th International Conference on Automated Deduction (CADE'17), 2017, Page(s) 60-76
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-63046-5_5

Machine-Checked Proofs of Privacy for Electronic Voting Protocols

Author(s): Veronique Cortier, Constantin Catalin Dragan, Francois Dupressoir, Benedikt Schmidt, Pierre-Yves Strub, Bogdan Warinschi
Published in: 2017 IEEE Symposium on Security and Privacy (SP), 2017, Page(s) 993-1008, ISBN 978-1-5090-5533-3
Publisher: IEEE
DOI: 10.1109/SP.2017.28

Formal Verification of Protocols Based on Short Authenticated Strings

Author(s): Stephanie Delaune, Steve Kremer, Ludovic Robin
Published in: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 2017, Page(s) 130-143, ISBN 978-1-5386-3217-8
Publisher: IEEE
DOI: 10.1109/CSF.2017.26

Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR

Author(s): David Baelde, Stephanie Delaune, Ivan Gazeau, Steve Kremer
Published in: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 2017, Page(s) 234-248, ISBN 978-1-5386-3217-8
Publisher: IEEE
DOI: 10.1109/CSF.2017.22

Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols

Author(s): Dreier , Jannik; Duménil , Charles; Kremer , Steve; Sasse , Ralf
Published in: "POST 2017 - 6th International Conference on Principles of Security and Trust, Apr 2017, Uppsala, Sweden. Springer, Security and Cryptology, 10204, pp.117-140, Principles of Security and Trust. 〈http://www.etaps.org/2017/post〉", Issue 3, 2017
Publisher: Springer
DOI: 10.1007/978-3-662-54455-6_6

Automated analysis of equivalence properties for security protocols using else branches

Author(s): Gazeau , Ivan; Kremer , Steve
Published in: 22nd European Symposium on Research in Computer Security (ESORICS'17), 2017, Oslo, Norway. Springer, 2017, Issue 14, 2017
Publisher: Springer

Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices

Author(s): Veronique Cortier, Alicia Filipiak, Jan Florent, Said Gharout, Jacques Traore
Published in: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017, Page(s) 467-480, ISBN 978-1-5090-5762-7
Publisher: IEEE
DOI: 10.1109/EuroSP.2017.19

Secure Composition of PKIs with Public Key Protocols

Author(s): Vincent Cheval, Veronique Cortier, Bogdan Warinschi
Published in: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 2017, Page(s) 144-158, ISBN 978-1-5386-3217-8
Publisher: IEEE
DOI: 10.1109/CSF.2017.28

A Type System for Privacy Properties

Author(s): Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei
Published in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 409-423, ISBN 9781-450349468
Publisher: ACM Press
DOI: 10.1145/3133956.3133998

The DEEPSEC prover

Author(s): Vincent Cheval, Steve Kremer, Itsaka Rakotonirina
Published in: 30th International Conference on Computer Aided Verification, Part II (CAV'18), 2018, Page(s) 28-36
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-96142-2_4

Equivalence properties by typing in cryptographic branching protocols

Author(s): Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei
Published in: 7th International Conference on Principles of Security and Trust (POST'18), 2018, Page(s) 160-187
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-89722-6_7

An Extensive Formal Analysis of Multi-factor Authentication Protocols

Author(s): Charlie Jacomme, Steve Kremer
Published in: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 2018, Page(s) 1-15, ISBN 978-1-5386-6680-7
Publisher: IEEE
DOI: 10.1109/CSF.2018.00008

A Formal Analysis of the Neuchatel e-Voting Protocol

Author(s): Veronique Cortier, David Galindo, Mathieu Turuani
Published in: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Page(s) 430-442, ISBN 978-1-5386-4228-3
Publisher: IEEE
DOI: 10.1109/EuroSP.2018.00037

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR

Author(s): Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse
Published in: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 2018, Page(s) 359-373, ISBN 978-1-5386-6680-7
Publisher: IEEE
DOI: 10.1109/CSF.2018.00033

Efficiently deciding equivalence for standard primitives and phases

Author(s): Véronique Cortier, Antoine Dallon, Stéphanie Delaune
Published in: Proceedings of the 23rd European Symposium on Research in Computer Security, Part I (ESORICS'18), 2018, Page(s) 491-511
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-99073-6_24

A Little More Conversation, a Little Less Action, a Lot More Satisfaction: Global States in ProVerif

Author(s): Vincent Cheval, Veronique Cortier, Mathieu Turuani
Published in: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 2018, Page(s) 344-358, ISBN 978-1-5386-6680-7
Publisher: IEEE
DOI: 10.1109/CSF.2018.00032

Machine-Checked Proofs for Electronic Voting: Privacy and Verifiability for Belenios

Author(s): Veronique Cortier, Constantin Catalin Dragan, Francois Dupressoir, Bogdan Warinschi
Published in: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 2018, Page(s) 298-312, ISBN 978-1-5386-6680-7
Publisher: IEEE
DOI: 10.1109/CSF.2018.00029

To Du or Not to Du: A Security Analysis of Du-Vote

Author(s): Steve Kremer, Peter B. Ronne
Published in: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), Issue annual, 2016, Page(s) 473-486, ISBN 978-1-5090-1752-2
Publisher: IEEE
DOI: 10.1109/EuroSP.2016.42

BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme

Author(s): Cortier, Véronique; Galindo, David; Chaidos, Pyrros; Fuchsbauer, Georg
Published in: 23rd ACM Conference on Computer and Communications Security (CCS'16), Oct 2016, Vienna, Austria. 2016, <10.1145/2976749.2978337>, Issue annual, 2016
Publisher: ACM
DOI: 10.1145/2976749.2978337

Symbolic Models for Isolated Execution Environments

Author(s): Scerri, Guillaume; Kremer, Steve; Jacomme, Charlie
Published in: 2nd IEEE European Symposium on Security and Privacy (EuroSP'17), Apr 2017, Paris, France, Issue annual, 2017
Publisher: Springer

When Are Three Voters Enough for Privacy Properties?

Author(s): Kremer, Steve; Cortier, Véronique; Arapinis, Myrto
Published in: Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II . Lecture Notes in Computer Science , vol. 9879 , Springer International Publishing , pp. 241-260 . DOI: 10.1007/978-3-319-45741-3_13, Issue annual, 2016
Publisher: Springer
DOI: 10.1007/978-3-319-45741-3_13

Automated Verification of Electrum Wallet

Author(s): Voegtlin, Thomas; Turuani, Mathieu; Rusinowitch, Michael
Published in: 3rd Workshop on Bitcoin and Blockchain Research, Issue annual, 2016
Publisher: Springer
DOI: 10.1007/978-3-662-53357-4_3

BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device

Author(s): Veronique Cortier, Alicia Filipiak, Joseph Lallemand
Published in: 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 2019, Page(s) 367-36714, ISBN 978-1-7281-1407-1
Publisher: IEEE
DOI: 10.1109/csf.2019.00032

Exploiting Symmetries When Proving Equivalence Properties for Security Protocols

Author(s): Vincent Cheval, Steve Kremer, Itsaka Rakotonirina
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 905-922, ISBN 9781-450367479
Publisher: ACM
DOI: 10.1145/3319535.3354260

Symbolic Methods in Computational Cryptography Proofs

Author(s): Gilles Barthe, Benjamin Gregoire, Charlie Jacomme, Steve Kremer, Pierre-Yves Strub
Published in: 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 2019, Page(s) 136-13615, ISBN 978-1-7281-1407-1
Publisher: IEEE
DOI: 10.1109/CSF.2019.00017

Voting - You Can't Have Privacy without Individual Verifiability

Author(s): Véronique Cortier, Joseph Lallemand
Published in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, Page(s) 53-66, ISBN 9781-450356930
Publisher: ACM
DOI: 10.1145/3243734.3243762

Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme

Author(s): Sergiu Bursuc, Constantin-Catalin Dragan, Steve Kremer
Published in: 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Page(s) 606-620, ISBN 978-1-7281-1148-3
Publisher: IEEE
DOI: 10.1109/eurosp.2019.00050

A Formal Analysis of 5G Authentication

Author(s): David Basin, Jannik Dreier, Lucca Hirschi, Saša Radomirovic, Ralf Sasse, Vincent Stettler
Published in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, Page(s) 1383-1396, ISBN 9781-450356930
Publisher: ACM
DOI: 10.1145/3243734.3243846

DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice

Author(s): Vincent Cheval, Steve Kremer, Itsaka Rakotonirina
Published in: 2018 IEEE Symposium on Security and Privacy (SP), 2018, Page(s) 529-546, ISBN 978-1-5386-4353-2
Publisher: IEEE
DOI: 10.1109/sp.2018.00033

Fifty Shades of Ballot Privacy: Privacy against a Malicious Board

Author(s): Veronique Cortier, Joseph Lallemand, Bogdan Warinschi
Published in: 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 2020, Page(s) 17-32, ISBN 978-1-7281-6572-1
Publisher: IEEE
DOI: 10.1109/csf49147.2020.00010

On the semantics of communications when verifying equivalence properties

Author(s): Kushal Babel, Vincent Cheval, Steve Kremer
Published in: Journal of Computer Security, Issue 28/1, 2020, Page(s) 71-127, ISSN 0926-227X
Publisher: IOS Press
DOI: 10.3233/jcs-191366

Automated verification of equivalence properties of cryptographic protocols

Author(s): Kremer, Steve; Ciobâcǎ, Ştefan; Chadha, Rohit; Cheval, Vincent
Published in: ACM Transactions on Computational Logic (TOCL), Issue Volume 17 Issue 4, 2016, Page(s) 1--32, ISSN 1529-3785
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/2926715

Automated analysis of security protocols with global state

Author(s): Steve Kremer, Robert Künnemann
Published in: Journal of Computer Security, Issue 24/5, 2016, Page(s) 583-616, ISSN 0926-227X
Publisher: IOS Press
DOI: 10.3233/JCS-160556

Typing Messages for Free in Security Protocols

Author(s): Rémy Chrétien, Véronique Cortier, Antoine Dallon, Stéphanie Delaune
Published in: ACM Transactions on Computational Logic, Issue 21/1, 2020, Page(s) 1-52, ISSN 1529-3785
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3343507

Rule-Based Unification in Combined Theories and the Finite Variant Property

Author(s): Ajay K. Eeralla, Serdar Erbatur, Andrew M. Marshall, Christophe Ringeissen
Published in: Language and Automata Theory and Applications - 13th International Conference, LATA 2019, St. Petersburg, Russia, March 26-29, 2019, Proceedings, Issue 11417, 2019, Page(s) 356-367, ISBN 978-3-030-13434-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-13435-8_26

Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification

Author(s): Sergiu Bursuc, Steve Kremer
Published in: Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I, Issue 11735, 2019, Page(s) 361-382, ISBN 978-3-030-29958-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-29959-0_18

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available