Number of documents

53

Steve Kremer


Journal articles10 documents

Conference papers31 documents

  • Sergiu Bursuc, Constantin-Catalin Dragan, Steve Kremer. Private votes on untrusted platforms: models, attacks and provable scheme. EuroS&P 2019 - 4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden. ⟨hal-02099434⟩
  • Gilles Barthe, Benjamin Grégoire, Charlie Jacomme, Steve Kremer, Pierre-Yves Strub. Symbolic methods in computational cryptography proofs. CSF 2019 - Proceedings of the 32nd IEEE Computer Security Foundations Symposium, Jun 2019, Hoboken, United States. ⟨hal-02117794⟩
  • Vincent Cheval, Steve Kremer, Itsaka Rakotonirina. DEEPSEC: Deciding Equivalence Properties in Security Protocols - Theory and Practice. 39th IEEE Symposium on Security and Privacy, May 2018, San Francisco, United States. ⟨hal-01763122⟩
  • Vincent Cheval, Steve Kremer, Itsaka Rakotonirina. The DEEPSEC prover. CAV 2018 - 30th International Conference on Computer Aided Verification, Jul 2018, Oxford, United Kingdom. ⟨hal-01763138⟩
  • Charlie Jacomme, Steve Kremer. An extensive formal analysis of multi-factor authentication protocols. CSF'2018 - 31st IEEE Computer Security Foundations Symposium, Jul 2018, Oxford, United Kingdom. ⟨10.1109/CSF.2018.00008⟩. ⟨hal-01922022⟩
  • Michael Backes, Jannik Dreier, Steve Kremer, Robert Künnemann. A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange. 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Apr 2017, Paris, France. ⟨10.1109/EuroSP.2017.12⟩. ⟨hal-01396282⟩
  • Kushal Babel, Vincent Cheval, Steve Kremer. On communication models when verifying equivalence properties (extended version). 6th International Conference on Principles of Security and Trust (POST), 2017, Uppsala, Sweden. ⟨hal-01438639⟩
  • Kushal Babel, Vincent Cheval, Steve Kremer. On communication models when verifying equivalence properties. 6th International Conference on Principles of Security and Trust (POST), Apr 2017, Uppsala, Sweden. ⟨hal-01450898⟩
  • David Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer. Symbolic verification of privacy-type properties for security protocols with XOR. CSF 2017 - 30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, United States. pp.15. ⟨hal-01533708⟩
  • Stéphanie Delaune, Steve Kremer, Ludovic Robin. Formal verification of protocols based on short authenticated strings. CSF 2017 - 30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, United States. pp.14. ⟨hal-01528607⟩
  • Jannik Dreier, Charles Duménil, Steve Kremer, Ralf Sasse. Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols. POST 2017 - 6th International Conference on Principles of Security and Trust, Apr 2017, Uppsala, Sweden. pp.117-140, ⟨10.1007/978-3-662-54455-6_6⟩. ⟨hal-01450916v2⟩
  • Jannik Dreier, Charles Duménil, Steve Kremer, Ralf Sasse. Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols (extended version). POST 2017 - 6th International Conference on Principles of Security and Trust, Apr 2017, Uppsala, Sweden. pp.117-140, ⟨10.1007/978-3-662-54455-6_6⟩. ⟨hal-01430490v2⟩
  • Ivan Gazeau, Steve Kremer. Automated analysis of equivalence properties for security protocols using else branches. 22nd European Symposium on Research in Computer Security (ESORICS'17), 2017, Oslo, Norway. ⟨hal-01566035⟩
  • Charlie Jacomme, Steve Kremer, Guillaume Scerri. Symbolic Models for Isolated Execution Environments. 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Apr 2017, Paris, France. ⟨hal-01396291⟩
  • Stéphanie Delaune, Steve Kremer, Ludovic Robin. Formal Verification of Protocols Based on Short Authenticated Strings. 2017 IEEE 30th Computer Security Foundations Symposium (CSF), Aug 2017, Santa Barbara, France. ⟨10.1109/CSF.2017.26⟩. ⟨hal-01906646⟩
  • David Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer. Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR. CSF 2017 - 30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, United States. ⟨10.1109/CSF.2017.22⟩. ⟨hal-01906644⟩
  • Myrto Arapinis, Véronique Cortier, Steve Kremer. When are three voters enough for privacy properties?. 21st European Symposium on Research in Computer Security, 2016, Heraklion, Crete, Greece. ⟨hal-01351398⟩
  • Steve Kremer, Peter Rønne. To Du or not to Du: A Security Analysis of Du-Vote. IEEE European Symposium on Security and Privacy 2016 , Mar 2016, Saarbrucken, Germany. ⟨hal-01238894⟩
  • Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling. Type-Based Verification of Electronic Voting Protocols. 4th Conference on Principles of Security and Trust (POST), Apr 2015, London, United Kingdom. ⟨hal-01103545⟩
  • Steve Kremer, Robert Künnemann. Automated Analysis of Security Protocols with Global State. 35th IEEE Symposium on Security and Privacy (S&P'14), May 2014, San Jose, United States. pp.163-178, ⟨10.1109/SP.2014.18⟩. ⟨hal-01091241⟩
  • Steve Kremer, Robert Künnemann, Graham Steel. Universally Composable Key-Management. 18th European Symposium on Research in Computer Security (ESORICS'13), 2013, Egham, United Kingdom. ⟨10.1007/978-3-642-40203-6_19⟩. ⟨hal-00878632⟩
  • Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark D. Ryan. Practical Everlasting Privacy. 2nd Conferences on Principles of Security and Trust (POST'13), Mar 2013, Rome, Italy. pp.21-40, ⟨10.1007/978-3-642-36830-1_2⟩. ⟨hal-00878630⟩
  • Rohit Chadha, Stefan Ciobaca, Steve Kremer. Automated verification of equivalence properties of cryptographic protocols. 21th European Symposium on Programming (ESOP'12), Mar 2012, Talinn, Estonia. pp.108-127, ⟨10.1007/978-3-642-28869-2_6⟩. ⟨hal-00732905⟩
  • Stéphanie Delaune, Steve Kremer, Daniel Pasaila. Security protocols, constraint systems, and group theories. 6th International Joint Conference on Automated Reasoning (IJCAR'12), Jun 2012, Manchester, United Kingdom. pp.164-178, ⟨10.1007/978-3-642-31365-3_15⟩. ⟨hal-00729091⟩
  • Stéphanie Delaune, Steve Kremer, Ryan Mark, Graham Steel. Formal analysis of protocols based on TPM state registers. 24th IEEE Computer Security Foundations Symposium (CSF'11), Jun 2011, Cernay-la-Ville, France. ⟨10.1109/CSF.2011.12⟩. ⟨inria-00636747⟩
  • Steve Kremer, Graham Steel, Bogdan Warinschi. Security for Key Management Interfaces. 24th IEEE Computer Security Foundations Symposium (CSF'11), Jun 2011, Cernay-la-Ville, France. ⟨10.1109/CSF.2011.25⟩. ⟨inria-00636734⟩
  • Céline Chevalier, Stéphanie Delaune, Steve Kremer. Transforming Password Protocols to Compose. 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), Dec 2011, Mumbai, India. ⟨inria-00636753⟩
  • Steve Kremer, Antoine Mercier, Ralf Treinen. Reducing Equational Theories for the Decision of Static Equivalence. Advances in Computer Science - ASIAN 2009, Dec 2009, Seoul, South Korea. pp.94--108, ⟨10.1007/978-3-642-10622-4_8⟩. ⟨hal-00495976⟩
  • Steve Kremer, Antoine Mercier, Ralf Treinen. Proving Group Protocols Secure Against Eavesdroppers. 4th International Joint Conference on Automated Reasoning (IJCAR 2008), Aug 2008, Sydney, Australia. pp.116-131, ⟨10.1007/978-3-540-71070-7_9⟩. ⟨hal-00496351⟩
  • Véronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi. Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), Dec 2006, Kolkata, India. ⟨inria-00108386⟩
  • Mathieu Baudet, Véronique Cortier, Steve Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries. 32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbonne/Portugal, pp.652-663, ⟨10.1007/11523468⟩. ⟨inria-00000555⟩

Books2 documents

  • Steve Kremer, Ludovic Mé, Didier Rémy, Vincent Roca. Cybersecurity: Current challenges and Inria's research directions. Inria, pp.172, 2019, Inria white book. ⟨hal-01993308⟩
  • Véronique Cortier, Steve Kremer. Formal Models and Techniques for Analyzing Security Protocols. Cortier, Véronique and Kremer, Steve. IOS Press, 5, pp.312, 2011, Cryptology and Information Security Series, 978-1-60750-713-0. ⟨inria-00636787⟩

Directions of work or proceedings1 document

  • Martin Abadi, Steve Kremer. Principles of Security and Trust: Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings. Martín Abadi and Steve Kremer. 3rd International Conference on Principles of Security and Trust (POST'14), France. 8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. ⟨10.1007/978-3-642-54792-8⟩. ⟨hal-01090879⟩

Preprints, Working Papers, ...1 document

  • Steve Kremer, Robert Kunnemann, Graham Steel. Universally Composable Key-Management. This is the full version of the paper. 2012. 〈hal-00686535〉

Reports7 documents

  • Vincent Cheval, Steve Kremer, Itsaka Rakotonirina. DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice. [Research Report] INRIA Nancy. 2018. ⟨hal-01698177⟩
  • Stéphanie Delaune, Steve Kremer, Ludovic Robin. Formal verification of protocols based on short authenticated strings (extended version). [Research Report] Inria Nancy - Grand Est. 2017. ⟨hal-01528603⟩
  • David Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer. Symbolic verification of privacy-type properties for security protocols with XOR (extended version). [Research Report] Inria Nancy - Grand Est. 2017, pp.29. ⟨hal-01533694⟩
  • Ivan Gazeau, Steve Kremer. Automated analysis of equivalence properties for security protocols using else branches (extended version). [Research Report] INRIA Nancy. 2017, pp.29. ⟨hal-01547017⟩
  • Steve Kremer, Robert Künnemann. Automated analysis of security protocols with global state. [Research Report] arXiv. 2014, pp.56. ⟨hal-00955869v2⟩
  • Rohit Chadha, Vincent Cheval, Stefan Ciobaca, Steve Kremer. Automated Verification of Equivalence Properties of Cryptographic Protocols. [Technical Report] Inria. 2012. ⟨inria-00632564v4⟩
  • Véronique Cortier, Steve Kremer, Bogdan Warinschi. A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems. [Research Report] RR-6912, INRIA. 2009, pp.42. ⟨inria-00379776⟩

Habilitation à diriger des recherches1 document

  • Steve Kremer. Modelling and analyzing security protocols in cryptographic process calculi. Computer Science [cs]. École normale supérieure de Cachan - ENS Cachan, 2011. ⟨tel-00636769⟩