Accéder directement au contenu

Steve Kremer

66
Documents

Publications

Image document

Universal Equivalence and Majority of Probabilistic Programs over Finite Fields

Gilles Barthe , Charlie Jacomme , Steve Kremer
ACM Transactions on Computational Logic, 2022, 23 (1), pp.1-42. ⟨10.1145/3487063⟩
Article dans une revue hal-03468834v1
Image document

An Extensive Formal Analysis of Multi-factor Authentication Protocols

Charlie Jacomme , Steve Kremer
ACM Transactions on Privacy and Security, 2021, 24 (2), pp.1-34. ⟨10.1145/3440712⟩
Article dans une revue hal-03468848v1
Image document

On the semantics of communications when verifying equivalence properties

Kushal Babel , Vincent Cheval , Steve Kremer
Journal of Computer Security, 2020, 28 (1), pp.71-127. ⟨10.3233/JCS-191366⟩
Article dans une revue hal-02446910v1

Vote par Internet

Véronique Cortier , Steve Kremer
Interstices, 2017
Article dans une revue hal-01350400v1
Image document

Automated verification of equivalence properties of cryptographic protocols

Rohit Chadha , Vincent Cheval , Ştefan Ciobâcǎ Ciobâcǎ , Steve Kremer
ACM Transactions on Computational Logic, 2016, 17 (4), ⟨10.1145/2926715⟩
Article dans une revue hal-01306561v1
Image document

Automated Analysis of Security Protocols with Global State

Steve Kremer , Robert Künnemann
Journal of Computer Security, 2016, 24 (5), ⟨10.3233/JCS-160556⟩
Article dans une revue hal-01351388v1
Image document

Formal Models and Techniques for Analyzing Security Protocols: A Tutorial

Véronique Cortier , Steve Kremer
Foundations and Trends in Programming Languages, 2014, 1 (3), pp.117. ⟨10.1561/2500000001⟩
Article dans une revue hal-01090874v1

Dynamic Tags for Security Protocols

Myrto Arapinis , Stéphanie Delaune , Steve Kremer
Logical Methods in Computer Science, 2014, 10 (2), pp.50. ⟨10.2168/LMCS-10(2:11)2014⟩
Article dans une revue hal-01090766v1
Image document

Composition of Password-based Protocols

Céline Chevalier , Stéphanie Delaune , Steve Kremer , Mark D. Ryan
Formal Methods in System Design, 2013, 43 (3), pp.369-413. ⟨10.1007/s10703-013-0184-6⟩
Article dans une revue hal-00878640v1
Image document

Reducing Equational Theories for the Decision of Static Equivalence

Steve Kremer , Antoine Mercier , Ralf Treinen
Journal of Automated Reasoning, 2012, 48 (2), pp.197-217. ⟨10.1007/s10817-010-9203-0⟩
Article dans une revue inria-00636797v1
Image document

Computing knowledge in security protocols under convergent equational theories

Stefan Ciobaca , Stéphanie Delaune , Steve Kremer
Journal of Automated Reasoning, 2012, 48 (2), pp.219-262. ⟨10.1007/s10817-010-9197-7⟩
Article dans une revue inria-00636794v1

A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems.

Véronique Cortier , Steve Kremer , Bogdan Warinschi
Journal of Automated Reasoning, 2011, 46 (3-4), pp.225-259. ⟨10.1007/s10817-010-9187-9⟩
Article dans une revue inria-00525776v1

Computationally Sound Implementations of Equational Theories against Passive Adversaries

Mathieu Baudet , Véronique Cortier , Steve Kremer
Information and Computation, 2009, 207 (4), pp.496-520. ⟨10.1016/j.ic.2008.12.005⟩
Article dans une revue inria-00426620v1
Image document

DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing

Max Ammann , Lucca Hirschi , Steve Kremer
45th IEEE Symposium on Security and Privacy, 2024, San Francisco (CA, USA), United States
Communication dans un congrès hal-04318710v2
Image document

Sapic+ : protocol verifiers of the world, unite!

Vincent Cheval , Charlie Jacomme , Steve Kremer , Robert Künnemann
USENIX 2022 - 31st USENIX Security Symposium, Aug 2022, Boston, United States
Communication dans un congrès hal-03693843v3
Image document

Symbolic protocol verification with dice: process equivalences in the presence of probabilities

Vincent Cheval , Raphaëlle Crubillé , Steve Kremer
CSF'22 - 35th IEEE Computer Security Foundations Symposium, Aug 2022, Haifa, Israel
Communication dans un congrès hal-03700492v1
Image document

Universal equivalence and majority of probabilistic programs over finite fields

Gilles Barthe , Charlie Jacomme , Steve Kremer
ACM/IEEE LICS 2020 - 35th Annual Symposium on Logic in Computer Science, Jul 2020, Saarbrücken / Virtual, Germany. pp.155-166, ⟨10.1145/3373718.3394746⟩
Communication dans un congrès hal-02961583v1
Image document

Private votes on untrusted platforms: models, attacks and provable scheme

Sergiu Bursuc , Constantin-Catalin Dragan , Steve Kremer
EuroS&P 2019 - 4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden
Communication dans un congrès hal-02099434v1
Image document

Symbolic Methods in Computational Cryptography Proofs

Gilles Barthe , Benjamin Grégoire , Charlie Jacomme , Steve Kremer , Pierre-Yves Strub
CSF2019 - 32nd IEEE Computer Security Foundations Symposium, Jun 2019, Hoboken, United States. pp.136-13615, ⟨10.1109/CSF.2019.00017⟩
Communication dans un congrès hal-02404701v1
Image document

Exploiting Symmetries When Proving Equivalence Properties for Security Protocols

Vincent Cheval , Steve Kremer , Itsaka Rakotonirina
CCS'19 - 26th ACM Conference on Computer and Communications Security, Nov 2019, London, United Kingdom
Communication dans un congrès hal-02269043v1
Image document

Contingent payments on a public ledger: models and reductions for automated verification

Sergiu Bursuc , Steve Kremer
ESORICS 2019 - The 24th European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg
Communication dans un congrès hal-02269063v1
Image document

An extensive formal analysis of multi-factor authentication protocols

Charlie Jacomme , Steve Kremer
CSF'2018 - 31st IEEE Computer Security Foundations Symposium, Jul 2018, Oxford, United Kingdom. ⟨10.1109/CSF.2018.00008⟩
Communication dans un congrès hal-01922022v1
Image document

DEEPSEC: Deciding Equivalence Properties in Security Protocols - Theory and Practice

Vincent Cheval , Steve Kremer , Itsaka Rakotonirina
39th IEEE Symposium on Security and Privacy, May 2018, San Francisco, United States
Communication dans un congrès hal-01763122v1
Image document

The DEEPSEC prover

Vincent Cheval , Steve Kremer , Itsaka Rakotonirina
CAV 2018 - 30th International Conference on Computer Aided Verification, Jul 2018, Oxford, United Kingdom
Communication dans un congrès hal-01763138v1
Image document

A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange

Michael Backes , Jannik Dreier , Steve Kremer , Robert Künnemann
2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Apr 2017, Paris, France. ⟨10.1109/EuroSP.2017.12⟩
Communication dans un congrès hal-01396282v1
Image document

On communication models when verifying equivalence properties (extended version)

Kushal Babel , Vincent Cheval , Steve Kremer
6th International Conference on Principles of Security and Trust (POST), 2017, Uppsala, Sweden
Communication dans un congrès hal-01438639v1
Image document

Formal verification of protocols based on short authenticated strings

Stéphanie Delaune , Steve Kremer , Ludovic Robin
CSF 2017 - 30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, United States. pp.14
Communication dans un congrès hal-01528607v1
Image document

On communication models when verifying equivalence properties

Kushal Babel , Vincent Cheval , Steve Kremer
6th International Conference on Principles of Security and Trust (POST), Apr 2017, Uppsala, Sweden
Communication dans un congrès hal-01450898v1
Image document

Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols (extended version)

Jannik Dreier , Charles Duménil , Steve Kremer , Ralf Sasse
POST 2017 - 6th International Conference on Principles of Security and Trust, Apr 2017, Uppsala, Sweden. pp.117-140, ⟨10.1007/978-3-662-54455-6_6⟩
Communication dans un congrès hal-01430490v2
Image document

Symbolic Models for Isolated Execution Environments

Charlie Jacomme , Steve Kremer , Guillaume Scerri
2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Apr 2017, Paris, France. ⟨10.1109/EuroSP.2017.16⟩
Communication dans un congrès hal-01396291v1
Image document

Automated analysis of equivalence properties for security protocols using else branches

Ivan Gazeau , Steve Kremer
22nd European Symposium on Research in Computer Security (ESORICS'17), 2017, Oslo, Norway
Communication dans un congrès hal-01566035v1
Image document

Symbolic verification of privacy-type properties for security protocols with XOR

David Baelde , Stéphanie Delaune , Ivan Gazeau , Steve Kremer
CSF 2017 - 30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, United States. pp.15
Communication dans un congrès hal-01533708v1
Image document

When are three voters enough for privacy properties?

Myrto Arapinis , Véronique Cortier , Steve Kremer
21st European Symposium on Research in Computer Security, 2016, Heraklion, Crete, Greece
Communication dans un congrès hal-01351398v1
Image document

To Du or not to Du: A Security Analysis of Du-Vote

Steve Kremer , Peter Rønne
IEEE European Symposium on Security and Privacy 2016 , Mar 2016, Saarbrucken, Germany
Communication dans un congrès hal-01238894v1

La création typographique au service des humanités numériques

Steve Kremer
Colloque scientifique Collecta : des pratiques antiquaires aux humanités numériques, 2016, Paris, France
Communication dans un congrès halshs-03187640v1
Image document

Type-Based Verification of Electronic Voting Protocols

Véronique Cortier , Fabienne Eigner , Steve Kremer , Matteo Maffei , Cyrille Wiedling
4th Conference on Principles of Security and Trust (POST), Apr 2015, London, United Kingdom
Communication dans un congrès hal-01103545v1
Image document

Automated Analysis of Security Protocols with Global State

Steve Kremer , Robert Künnemann
35th IEEE Symposium on Security and Privacy (S&P'14), May 2014, San Jose, United States. pp.163-178, ⟨10.1109/SP.2014.18⟩
Communication dans un congrès hal-01091241v1
Image document

Universally Composable Key-Management

Steve Kremer , Robert Künnemann , Graham Steel
18th European Symposium on Research in Computer Security (ESORICS'13), 2013, Egham, United Kingdom. ⟨10.1007/978-3-642-40203-6_19⟩
Communication dans un congrès hal-00878632v1
Image document

Practical Everlasting Privacy

Myrto Arapinis , Véronique Cortier , Steve Kremer , Mark D. Ryan
2nd Conferences on Principles of Security and Trust (POST'13), Mar 2013, Rome, Italy. pp.21-40, ⟨10.1007/978-3-642-36830-1_2⟩
Communication dans un congrès hal-00878630v1
Image document

Security protocols, constraint systems, and group theories

Stéphanie Delaune , Steve Kremer , Daniel Pasaila
6th International Joint Conference on Automated Reasoning (IJCAR'12), Jun 2012, Manchester, United Kingdom. pp.164-178, ⟨10.1007/978-3-642-31365-3_15⟩
Communication dans un congrès hal-00729091v1
Image document

Automated verification of equivalence properties of cryptographic protocols

Rohit Chadha , Stefan Ciobaca , Steve Kremer
21th European Symposium on Programming (ESOP'12), Mar 2012, Talinn, Estonia. pp.108-127, ⟨10.1007/978-3-642-28869-2_6⟩
Communication dans un congrès hal-00732905v1
Image document

Formal analysis of protocols based on TPM state registers

Stéphanie Delaune , Steve Kremer , Ryan D. Mark , Graham Steel
24th IEEE Computer Security Foundations Symposium (CSF'11), Jun 2011, Cernay-la-Ville, France. ⟨10.1109/CSF.2011.12⟩
Communication dans un congrès inria-00636747v1
Image document

Security for Key Management Interfaces

Steve Kremer , Graham Steel , Bogdan Warinschi
24th IEEE Computer Security Foundations Symposium (CSF'11), Jun 2011, Cernay-la-Ville, France. ⟨10.1109/CSF.2011.25⟩
Communication dans un congrès inria-00636734v1
Image document

Transforming Password Protocols to Compose

Céline Chevalier , Stéphanie Delaune , Steve Kremer
31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), Dec 2011, Mumbai, India
Communication dans un congrès inria-00636753v1

Reducing Equational Theories for the Decision of Static Equivalence

Steve Kremer , Antoine Mercier , Ralf Treinen
Advances in Computer Science - ASIAN 2009, Dec 2009, Seoul, South Korea. pp.94--108, ⟨10.1007/978-3-642-10622-4_8⟩
Communication dans un congrès hal-00495976v1

Proving Group Protocols Secure Against Eavesdroppers

Steve Kremer , Antoine Mercier , Ralf Treinen
4th International Joint Conference on Automated Reasoning (IJCAR 2008), Aug 2008, Sydney, Australia. pp.116-131, ⟨10.1007/978-3-540-71070-7_9⟩
Communication dans un congrès hal-00496351v1

Computationally Sound Symbolic Secrecy in the Presence of Hash Functions

Véronique Cortier , Steve Kremer , Ralf Kuesters , Bogdan Warinschi
Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), Dec 2006, Kolkata, India
Communication dans un congrès inria-00108386v1

Computationally Sound Implementations of Equational Theories against Passive Adversaries

Mathieu Baudet , Véronique Cortier , Steve Kremer
32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbonne/Portugal, pp.652-663, ⟨10.1007/11523468⟩
Communication dans un congrès inria-00000555v1
Image document

Cybersecurity

Steve Kremer , Ludovic Mé , Didier Rémy , Vincent Roca
Inria, 3, pp.172, 2019, Inria white book
Ouvrages hal-01993308v1
Image document

Cybersécurité

Steve Kremer , Ludovic Mé , Didier Rémy , Vincent Roca
Inria, 3, pp.18, 2019, Inria white book
Ouvrages hal-02414281v1

Formal Models and Techniques for Analyzing Security Protocols

Véronique Cortier , Steve Kremer
Cortier, Véronique and Kremer, Steve. IOS Press, 5, pp.312, 2011, Cryptology and Information Security Series, 978-1-60750-713-0
Ouvrages inria-00636787v1
Image document

Le traçage anonyme, dangereux oxymore

Xavier Bonnetain , Anne Canteaut , Véronique Cortier , Pierrick Gaudry , Lucca Hirschi
Le droit face au coronavirus, LexisNexis, pp.468--480, 2021, 9782711036394
Chapitre d'ouvrage hal-02997228v1
Image document

The hitchhiker's guide to decidability and complexity of equivalence properties in security protocols

Vincent Cheval , Steve Kremer , Itsaka Rakotonirina
Nigam, V., Ban Kirigin, T., Talcott, C., Guttman, J., Kuznetsov, S., Thau Loo, B., Okada, M. Logic, Language, and Security - Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday, LNCS-12300, Springer, 2020, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-62077-6_10⟩
Chapitre d'ouvrage hal-02961617v1
Image document

The hitchhiker's guide to decidability and complexity of equivalence properties in security protocols (technical report)

Vincent Cheval , Steve Kremer , Itsaka Rakotonirina
[Technical Report] Inria Nancy Grand-Est. 2020
Rapport hal-02501577v4
Image document

Universal equivalence and majority of probabilistic programs over finite fields

Gilles Barthe , Charlie Jacomme , Steve Kremer
[Research Report] MPI SP; LSV, ENS Cachan, CNRS, INRIA, Université Paris-Saclay, Cachan (France); LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy. 2020
Rapport hal-02552287v2
Image document

Exploiting symmetries when proving equivalence properties for security protocols (Technical report)

Vincent Cheval , Steve Kremer , Itsaka Rakotonirina
[Technical Report] INRIA Nancy Grand-Est. 2020
Rapport hal-02267866v3
Image document

DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice

Vincent Cheval , Steve Kremer , Itsaka Rakotonirina
[Research Report] INRIA Nancy. 2018
Rapport hal-01698177v1
Image document

Formal verification of protocols based on short authenticated strings (extended version)

Stéphanie Delaune , Steve Kremer , Ludovic Robin
[Research Report] Inria Nancy - Grand Est. 2017
Rapport hal-01528603v1
Image document

Automated analysis of equivalence properties for security protocols using else branches (extended version)

Ivan Gazeau , Steve Kremer
[Research Report] INRIA Nancy. 2017, pp.29
Rapport hal-01547017v1
Image document

Symbolic verification of privacy-type properties for security protocols with XOR (extended version)

David Baelde , Stéphanie Delaune , Ivan Gazeau , Steve Kremer
[Research Report] Inria Nancy - Grand Est. 2017, pp.29
Rapport hal-01533694v1
Image document

Automated analysis of security protocols with global state

Steve Kremer , Robert Künnemann
[Research Report] arXiv. 2014, pp.56
Rapport hal-00955869v2
Image document

Automated Verification of Equivalence Properties of Cryptographic Protocols

Rohit Chadha , Vincent Cheval , Stefan Ciobaca , Steve Kremer
[Technical Report] Inria. 2012
Rapport inria-00632564v4
Image document

A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems

Véronique Cortier , Steve Kremer , Bogdan Warinschi
[Research Report] RR-6912, INRIA. 2009, pp.42
Rapport inria-00379776v1
Image document

Modelling and analyzing security protocols in cryptographic process calculi

Steve Kremer
Computer Science [cs]. École normale supérieure de Cachan - ENS Cachan, 2011
HDR tel-00636769v1