Nombre de documents

34

Steve Kremer


Article dans une revue10 documents

  • Rohit Chadha, Vincent Cheval, Ştefan Ciobâcǎ, Steve Kremer. Automated verification of equivalence properties of cryptographic protocols. ACM Transactions on Computational Logic, Association for Computing Machinery, 2016, 17 (4), <10.1145/2926715>. <hal-01306561>
  • Steve Kremer, Robert Künnemann. Automated Analysis of Security Protocols with Global State. Journal of Computer Security, IOS Press, 2016, 24 (5), <10.3233/JCS-160556>. <hal-01351388>
  • Myrto Arapinis, Stéphanie Delaune, Steve Kremer. Dynamic Tags for Security Protocols. Logical Methods in Computer Science, Logical Methods in Computer Science Association, 2014, 10 (2), pp.50. <10.2168/LMCS-10(2:11)2014>. <hal-01090766>
  • Véronique Cortier, Steve Kremer. Formal Models and Techniques for Analyzing Security Protocols: A Tutorial. Foundations and Trends in Programming Languages, Now Publishers, 2014, 1 (3), pp.117. <10.1561/2500000001>. <hal-01090874>
  • Véronique Cortier, Steve Kremer. Vote par Internet. Interstices, INRIA, 2013, <https://interstices.info/jcms/int_68258/vote-par-internet>. <hal-01350400>
  • Céline Chevalier, Stéphanie Delaune, Steve Kremer, Mark D. Ryan. Composition of Password-based Protocols. Formal Methods in System Design, Springer Verlag, 2013, 43 (3), pp.369-413. <10.1007/s10703-013-0184-6>. <hal-00878640>
  • Stefan Ciobaca, Stéphanie Delaune, Steve Kremer. Computing knowledge in security protocols under convergent equational theories. Journal of Automated Reasoning, Springer Verlag, 2012, 48 (2), pp.219-262. <10.1007/s10817-010-9197-7>. <inria-00636794>
  • Steve Kremer, Antoine Mercier, Ralf Treinen. Reducing Equational Theories for the Decision of Static Equivalence. Journal of Automated Reasoning, Springer Verlag, 2012, 48 (2), pp.197-217. <10.1007/s10817-010-9203-0>. <inria-00636797>
  • Véronique Cortier, Steve Kremer, Bogdan Warinschi. A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems.. Journal of Automated Reasoning, Springer Verlag, 2011, 46 (3-4), pp.225-259. <10.1007/s10817-010-9187-9>. <inria-00525776>
  • Mathieu Baudet, Véronique Cortier, Steve Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries. Information and Computation, Elsevier, 2009, 207 (4), pp.496-520. <10.1016/j.ic.2008.12.005>. <inria-00426620>

Communication dans un congrès17 documents

  • Michael Backes, Jannik Dreier, Steve Kremer, Robert Künnemann. A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange. 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), 2017, Paris, France. Springer, Proceedings of the 2nd IEEE European Symposium on Security and Privacy. <hal-01396282>
  • Charlie Jacomme, Steve Kremer, Guillaume Scerri. Symbolic Models for Isolated Execution Environments. 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), 2017, Paris, France. Springer, Proceedings of the 2nd IEEE European Symposium on Security and Privacy. <hal-01396291>
  • Myrto Arapinis, Véronique Cortier, Steve Kremer. When are three voters enough for privacy properties?. 21st European Symposium on Research in Computer Security, 2016, Heraklion, Crete, Greece. Springer, 2016, 21st European Symposium on Research in Computer Security. <hal-01351398>
  • Steve Kremer, Peter Rønne. To Du or not to Du: A Security Analysis of Du-Vote. IEEE European Symposium on Security and Privacy 2016 , Mar 2016, Saarbrucken, Germany. IEEE Computer Society, Proceedings of the IEEE European Symposium on Security and Privacy 2016. <hal-01238894>
  • Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling. Type-Based Verification of Electronic Voting Protocols. 4th Conference on Principles of Security and Trust (POST), Apr 2015, London, United Kingdom. Springer, Proceedings of the 4th Conference on Principles of Security and Trust (POST). <hal-01103545>
  • Steve Kremer, Robert Künnemann. Automated Analysis of Security Protocols with Global State. IEEE Computer Society. 35th IEEE Symposium on Security and Privacy (S&P'14), May 2014, San Jose, United States. pp.163-178, Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P'14). <10.1109/SP.2014.18>. <hal-01091241>
  • Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark D. Ryan. Practical Everlasting Privacy. Basin, David and Mitchell, John. 2nd Conferences on Principles of Security and Trust (POST'13), Mar 2013, Rome, Italy. Springer, 7796, pp.21-40, 2013, Lecture Notes in Computer Science. <10.1007/978-3-642-36830-1_2>. <hal-00878630>
  • Steve Kremer, Robert Künnemann, Graham Steel. Universally Composable Key-Management. Crampton, Jason and Jajodia, Sushil. 18th European Symposium on Research in Computer Security (ESORICS'13), 2013, Egham, United Kingdom. Springer, 8134, 2013, Lecture Notes in Computer Science. <10.1007/978-3-642-40203-6_19>. <hal-00878632>
  • Stéphanie Delaune, Steve Kremer, Daniel Pasaila. Security protocols, constraint systems, and group theories. 6th International Joint Conference on Automated Reasoning (IJCAR'12), Jun 2012, Manchester, United Kingdom. Springer, 7364, pp.164-178, 2012, Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12). <10.1007/978-3-642-31365-3_15>. <hal-00729091>
  • Rohit Chadha, Stefan Ciobaca, Steve Kremer. Automated verification of equivalence properties of cryptographic protocols. Helmut Seidl. 21th European Symposium on Programming (ESOP'12), Mar 2012, Talinn, Estonia. Springer, 7211, pp.108-127, 2012, Proceedings of the 21th European Symposium on Programming (ESOP'12). <10.1007/978-3-642-28869-2_6>. <hal-00732905>
  • Céline Chevalier, Stéphanie Delaune, Steve Kremer. Transforming Password Protocols to Compose. 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), Dec 2011, Mumbai, India. 2011. <inria-00636753>
  • Steve Kremer, Graham Steel, Bogdan Warinschi. Security for Key Management Interfaces. 24th IEEE Computer Security Foundations Symposium (CSF'11), Jun 2011, Cernay-la-Ville, France. IEEE Computer Society, 2011, Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11). <10.1109/CSF.2011.25>. <inria-00636734>
  • Stéphanie Delaune, Steve Kremer, Ryan Mark, Graham Steel. Formal analysis of protocols based on TPM state registers. 24th IEEE Computer Security Foundations Symposium (CSF'11), Jun 2011, Cernay-la-Ville, France. IEEE Computer Society, 2011, Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11). <10.1109/CSF.2011.12>. <inria-00636747>
  • Steve Kremer, Antoine Mercier, Ralf Treinen. Reducing Equational Theories for the Decision of Static Equivalence. Anupam Datta. Advances in Computer Science - ASIAN 2009, Dec 2009, Seoul, South Korea. Springer Verlag, 5913, pp.94--108, 2009, LNCS. <10.1007/978-3-642-10622-4_8>. <hal-00495976>
  • Steve Kremer, Antoine Mercier, Ralf Treinen. Proving Group Protocols Secure Against Eavesdroppers. Alessandro Armando, Peter Baumgartner, Gilles Dowek. 4th International Joint Conference on Automated Reasoning (IJCAR 2008), Aug 2008, Sydney, Australia. Springer Verlag, 5195, pp.116-131, 2008, LNCS. <10.1007/978-3-540-71070-7_9>. <hal-00496351>
  • Véronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi. Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), Dec 2006, Kolkata, India, 2006. <inria-00108386>
  • Mathieu Baudet, Véronique Cortier, Steve Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries. Luís Caires, Giuseppe F. Italiano, Luís Monteiro, Catuscia Palamidessi, Moti Yung. 32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbonne/Portugal, Springer-Verlag, 3580, pp.652-663, 2005, Lecture Notes in Computer Science. <10.1007/11523468>. <inria-00000555>

Ouvrage (y compris édition critique et traduction)1 document

  • Véronique Cortier, Steve Kremer. Formal Models and Techniques for Analyzing Security Protocols. Cortier, Véronique and Kremer, Steve. IOS Press, 5, pp.312, 2011, Cryptology and Information Security Series, 978-1-60750-713-0. <inria-00636787>

Direction d'ouvrage, Proceedings1 document

  • Martin Abadi, Steve Kremer. Principles of Security and Trust: Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings. Martín Abadi and Steve Kremer. 3rd International Conference on Principles of Security and Trust (POST'14), France. 8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. <10.1007/978-3-642-54792-8>. <hal-01090879>

Pré-publication, Document de travail1 document

  • Steve Kremer, Robert Kunnemann, Graham Steel. Universally Composable Key-Management. This is the full version of the paper. 2012. <hal-00686535>

Rapport3 documents

  • Steve Kremer, Robert Künnemann. Automated analysis of security protocols with global state. [Research Report] arXiv. 2014, pp.56. <hal-00955869v2>
  • Rohit Chadha, Vincent Cheval, Stefan Ciobaca, Steve Kremer. Automated Verification of Equivalence Properties of Cryptographic Protocols. [Technical Report] Inria. 2012. <inria-00632564v4>
  • Véronique Cortier, Steve Kremer, Bogdan Warinschi. A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems. [Research Report] RR-6912, INRIA. 2009, pp.42. <inria-00379776>

HDR1 document

  • Steve Kremer. Modelling and analyzing security protocols in cryptographic process calculi. Computer Science [cs]. École normale supérieure de Cachan - ENS Cachan, 2011. <tel-00636769>