Skip to Main content
Number of documents

61

Steve Kremer


Journal articles11 documents

  • Kushal Babel, Vincent Cheval, Steve Kremer. On the semantics of communications when verifying equivalence properties. Journal of Computer Security, IOS Press, In press, 28 (1), pp.71-127. ⟨10.3233/JCS-191366⟩. ⟨hal-02446910⟩
  • Véronique Cortier, Steve Kremer. Vote par Internet. Interstices, INRIA, 2017. ⟨hal-01350400⟩
  • Steve Kremer, Robert Künnemann. Automated Analysis of Security Protocols with Global State. Journal of Computer Security, IOS Press, 2016, 24 (5), ⟨10.3233/JCS-160556⟩. ⟨hal-01351388⟩
  • Rohit Chadha, Vincent Cheval, Ştefan Ciobâcǎ, Steve Kremer. Automated verification of equivalence properties of cryptographic protocols. ACM Transactions on Computational Logic, Association for Computing Machinery, 2016, 17 (4), ⟨10.1145/2926715⟩. ⟨hal-01306561⟩
  • Myrto Arapinis, Stéphanie Delaune, Steve Kremer. Dynamic Tags for Security Protocols. Logical Methods in Computer Science, Logical Methods in Computer Science Association, 2014, 10 (2), pp.50. ⟨10.2168/LMCS-10(2:11)2014⟩. ⟨hal-01090766⟩
  • Véronique Cortier, Steve Kremer. Formal Models and Techniques for Analyzing Security Protocols: A Tutorial. Foundations and Trends in Programming Languages, Now Publishers, 2014, 1 (3), pp.117. ⟨10.1561/2500000001⟩. ⟨hal-01090874⟩
  • Céline Chevalier, Stéphanie Delaune, Steve Kremer, Mark Ryan. Composition of Password-based Protocols. Formal Methods in System Design, Springer Verlag, 2013, 43 (3), pp.369-413. ⟨10.1007/s10703-013-0184-6⟩. ⟨hal-00878640⟩
  • Steve Kremer, Antoine Mercier, Ralf Treinen. Reducing Equational Theories for the Decision of Static Equivalence. Journal of Automated Reasoning, Springer Verlag, 2012, 48 (2), pp.197-217. ⟨10.1007/s10817-010-9203-0⟩. ⟨inria-00636797⟩
  • Stefan Ciobaca, Stéphanie Delaune, Steve Kremer. Computing knowledge in security protocols under convergent equational theories. Journal of Automated Reasoning, Springer Verlag, 2012, 48 (2), pp.219-262. ⟨10.1007/s10817-010-9197-7⟩. ⟨inria-00636794⟩
  • Véronique Cortier, Steve Kremer, Bogdan Warinschi. A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems.. Journal of Automated Reasoning, Springer Verlag, 2011, 46 (3-4), pp.225-259. ⟨10.1007/s10817-010-9187-9⟩. ⟨inria-00525776⟩
  • Mathieu Baudet, Véronique Cortier, Steve Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries. Information and Computation, Elsevier, 2009, 207 (4), pp.496-520. ⟨10.1016/j.ic.2008.12.005⟩. ⟨inria-00426620⟩

Conference papers33 documents

  • Vincent Cheval, Steve Kremer, Itsaka Rakotonirina. The hitchhiker's guide to decidability and complexity of equivalence properties in security protocols. Logic, Language, and Security. Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday, 2020, Philadelphia, United States. ⟨hal-02961617⟩
  • Gilles Barthe, Charlie Jacomme, Steve Kremer. Universal equivalence and majority of probabilistic programs over finite fields. ACM/IEEE LICS 2020 - 35th Annual Symposium on Logic in Computer Science, Jul 2020, Saarbrücken / Virtual, Germany. pp.155-166, ⟨10.1145/3373718.3394746⟩. ⟨hal-02961583⟩
  • Gilles Barthe, Benjamin Grégoire, Charlie Jacomme, Steve Kremer, Pierre-Yves Strub. Symbolic Methods in Computational Cryptography Proofs. CSF2019 - 32nd IEEE Computer Security Foundations Symposium, Jun 2019, Hoboken, United States. pp.136-13615, ⟨10.1109/CSF.2019.00017⟩. ⟨hal-02404701⟩
  • Vincent Cheval, Steve Kremer, Itsaka Rakotonirina. Exploiting Symmetries When Proving Equivalence Properties for Security Protocols. CCS'19 - 26th ACM Conference on Computer and Communications Security, Nov 2019, London, United Kingdom. ⟨hal-02269043⟩
  • Sergiu Bursuc, Steve Kremer. Contingent payments on a public ledger: models and reductions for automated verification. ESORICS 2019 - The 24th European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. ⟨hal-02269063⟩
  • Sergiu Bursuc, Constantin-Catalin Dragan, Steve Kremer. Private votes on untrusted platforms: models, attacks and provable scheme. EuroS&P 2019 - 4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden. ⟨hal-02099434⟩
  • Charlie Jacomme, Steve Kremer. An extensive formal analysis of multi-factor authentication protocols. CSF'2018 - 31st IEEE Computer Security Foundations Symposium, Jul 2018, Oxford, United Kingdom. ⟨10.1109/CSF.2018.00008⟩. ⟨hal-01922022⟩
  • Vincent Cheval, Steve Kremer, Itsaka Rakotonirina. The DEEPSEC prover. CAV 2018 - 30th International Conference on Computer Aided Verification, Jul 2018, Oxford, United Kingdom. ⟨hal-01763138⟩
  • Vincent Cheval, Steve Kremer, Itsaka Rakotonirina. DEEPSEC: Deciding Equivalence Properties in Security Protocols - Theory and Practice. 39th IEEE Symposium on Security and Privacy, May 2018, San Francisco, United States. ⟨hal-01763122⟩
  • Charlie Jacomme, Steve Kremer, Guillaume Scerri. Symbolic Models for Isolated Execution Environments. 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Apr 2017, Paris, France. ⟨10.1109/EuroSP.2017.16⟩. ⟨hal-01396291⟩
  • David Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer. Symbolic verification of privacy-type properties for security protocols with XOR. CSF 2017 - 30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, United States. pp.15. ⟨hal-01533708⟩
  • Kushal Babel, Vincent Cheval, Steve Kremer. On communication models when verifying equivalence properties. 6th International Conference on Principles of Security and Trust (POST), Apr 2017, Uppsala, Sweden. ⟨hal-01450898⟩
  • Ivan Gazeau, Steve Kremer. Automated analysis of equivalence properties for security protocols using else branches. 22nd European Symposium on Research in Computer Security (ESORICS'17), 2017, Oslo, Norway. ⟨hal-01566035⟩
  • Michael Backes, Jannik Dreier, Steve Kremer, Robert Künnemann. A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange. 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Apr 2017, Paris, France. ⟨10.1109/EuroSP.2017.12⟩. ⟨hal-01396282⟩
  • Jannik Dreier, Charles Duménil, Steve Kremer, Ralf Sasse. Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols (extended version). POST 2017 - 6th International Conference on Principles of Security and Trust, Apr 2017, Uppsala, Sweden. pp.117-140, ⟨10.1007/978-3-662-54455-6_6⟩. ⟨hal-01430490v2⟩
  • Kushal Babel, Vincent Cheval, Steve Kremer. On communication models when verifying equivalence properties (extended version). 6th International Conference on Principles of Security and Trust (POST), 2017, Uppsala, Sweden. ⟨hal-01438639⟩
  • Stéphanie Delaune, Steve Kremer, Ludovic Robin. Formal verification of protocols based on short authenticated strings. CSF 2017 - 30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, United States. pp.14. ⟨hal-01528607⟩
  • Myrto Arapinis, Véronique Cortier, Steve Kremer. When are three voters enough for privacy properties?. 21st European Symposium on Research in Computer Security, 2016, Heraklion, Crete, Greece. ⟨hal-01351398⟩
  • Steve Kremer. La création typographique au service des humanités numériques. Colloque scientifique Collecta : des pratiques antiquaires aux humanités numériques, 2016, Paris, France. ⟨halshs-03187640⟩
  • Steve Kremer, Peter Rønne. To Du or not to Du: A Security Analysis of Du-Vote. IEEE European Symposium on Security and Privacy 2016 , Mar 2016, Saarbrucken, Germany. ⟨hal-01238894⟩
  • Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling. Type-Based Verification of Electronic Voting Protocols. 4th Conference on Principles of Security and Trust (POST), Apr 2015, London, United Kingdom. ⟨hal-01103545⟩
  • Steve Kremer, Robert Künnemann. Automated Analysis of Security Protocols with Global State. 35th IEEE Symposium on Security and Privacy (S&P'14), May 2014, San Jose, United States. pp.163-178, ⟨10.1109/SP.2014.18⟩. ⟨hal-01091241⟩
  • Steve Kremer, Robert Künnemann, Graham Steel. Universally Composable Key-Management. 18th European Symposium on Research in Computer Security (ESORICS'13), 2013, Egham, United Kingdom. ⟨10.1007/978-3-642-40203-6_19⟩. ⟨hal-00878632⟩
  • Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark Ryan. Practical Everlasting Privacy. 2nd Conferences on Principles of Security and Trust (POST'13), Mar 2013, Rome, Italy. pp.21-40, ⟨10.1007/978-3-642-36830-1_2⟩. ⟨hal-00878630⟩
  • Rohit Chadha, Stefan Ciobaca, Steve Kremer. Automated verification of equivalence properties of cryptographic protocols. 21th European Symposium on Programming (ESOP'12), Mar 2012, Talinn, Estonia. pp.108-127, ⟨10.1007/978-3-642-28869-2_6⟩. ⟨hal-00732905⟩
  • Stéphanie Delaune, Steve Kremer, Daniel Pasaila. Security protocols, constraint systems, and group theories. 6th International Joint Conference on Automated Reasoning (IJCAR'12), Jun 2012, Manchester, United Kingdom. pp.164-178, ⟨10.1007/978-3-642-31365-3_15⟩. ⟨hal-00729091⟩
  • Steve Kremer, Graham Steel, Bogdan Warinschi. Security for Key Management Interfaces. 24th IEEE Computer Security Foundations Symposium (CSF'11), Jun 2011, Cernay-la-Ville, France. ⟨10.1109/CSF.2011.25⟩. ⟨inria-00636734⟩
  • Stéphanie Delaune, Steve Kremer, Ryan Mark, Graham Steel. Formal analysis of protocols based on TPM state registers. 24th IEEE Computer Security Foundations Symposium (CSF'11), Jun 2011, Cernay-la-Ville, France. ⟨10.1109/CSF.2011.12⟩. ⟨inria-00636747⟩
  • Céline Chevalier, Stéphanie Delaune, Steve Kremer. Transforming Password Protocols to Compose. 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), Dec 2011, Mumbai, India. ⟨inria-00636753⟩
  • Steve Kremer, Antoine Mercier, Ralf Treinen. Reducing Equational Theories for the Decision of Static Equivalence. Advances in Computer Science - ASIAN 2009, Dec 2009, Seoul, South Korea. pp.94--108, ⟨10.1007/978-3-642-10622-4_8⟩. ⟨hal-00495976⟩
  • Steve Kremer, Antoine Mercier, Ralf Treinen. Proving Group Protocols Secure Against Eavesdroppers. 4th International Joint Conference on Automated Reasoning (IJCAR 2008), Aug 2008, Sydney, Australia. pp.116-131, ⟨10.1007/978-3-540-71070-7_9⟩. ⟨hal-00496351⟩
  • Véronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi. Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), Dec 2006, Kolkata, India. ⟨inria-00108386⟩
  • Mathieu Baudet, Véronique Cortier, Steve Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries. 32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbonne/Portugal, pp.652-663, ⟨10.1007/11523468⟩. ⟨inria-00000555⟩

Books3 documents

  • Steve Kremer, Ludovic Mé, Didier Rémy, Vincent Roca. Cybersécurité. Inria, pp.18, 2019, Inria white book. ⟨hal-02414281⟩
  • Steve Kremer, Ludovic Mé, Didier Rémy, Vincent Roca. Cybersecurity: Current challenges and Inria's research directions. Inria, pp.172, 2019, Inria white book. ⟨hal-01993308⟩
  • Véronique Cortier, Steve Kremer. Formal Models and Techniques for Analyzing Security Protocols. Cortier, Véronique and Kremer, Steve. IOS Press, 5, pp.312, 2011, Cryptology and Information Security Series, 978-1-60750-713-0. ⟨inria-00636787⟩

Directions of work or proceedings1 document

  • Martin Abadi, Steve Kremer. Principles of Security and Trust: Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings. Martín Abadi and Steve Kremer. 3rd International Conference on Principles of Security and Trust (POST'14), France. 8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. ⟨10.1007/978-3-642-54792-8⟩. ⟨hal-01090879⟩

Preprints, Working Papers, ...2 documents

  • Xavier Bonnetain, Anne Canteaut, Véronique Cortier, Pierrick Gaudry, Lucca Hirschi, et al.. Le traçage anonyme, dangereux oxymore : Analyse de risques à destination des non-spécialistes. 2020. ⟨hal-02997228⟩
  • Steve Kremer, Robert Kunnemann, Graham Steel. Universally Composable Key-Management. 2012. ⟨hal-00686535⟩

Reports10 documents

  • Gilles Barthe, Charlie Jacomme, Steve Kremer. Universal equivalence and majority of probabilistic programs over finite fields. [Research Report] MPI SP; LSV, ENS Cachan, CNRS, INRIA, Université Paris-Saclay, Cachan (France); LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy. 2020. ⟨hal-02552287v2⟩
  • Vincent Cheval, Steve Kremer, Itsaka Rakotonirina. Exploiting symmetries when proving equivalence properties for security protocols (Technical report). [Technical Report] INRIA Nancy Grand-Est. 2020. ⟨hal-02267866v3⟩
  • Vincent Cheval, Steve Kremer, Itsaka Rakotonirina. The hitchhiker's guide to decidability and complexity of equivalence properties in security protocols (technical report). [Technical Report] Inria Nancy Grand-Est. 2020. ⟨hal-02501577v4⟩
  • Vincent Cheval, Steve Kremer, Itsaka Rakotonirina. DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice. [Research Report] INRIA Nancy. 2018. ⟨hal-01698177⟩
  • Ivan Gazeau, Steve Kremer. Automated analysis of equivalence properties for security protocols using else branches (extended version). [Research Report] INRIA Nancy. 2017, pp.29. ⟨hal-01547017⟩
  • David Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer. Symbolic verification of privacy-type properties for security protocols with XOR (extended version). [Research Report] Inria Nancy - Grand Est. 2017, pp.29. ⟨hal-01533694⟩
  • Stéphanie Delaune, Steve Kremer, Ludovic Robin. Formal verification of protocols based on short authenticated strings (extended version). [Research Report] Inria Nancy - Grand Est. 2017. ⟨hal-01528603⟩
  • Steve Kremer, Robert Künnemann. Automated analysis of security protocols with global state. [Research Report] arXiv. 2014, pp.56. ⟨hal-00955869v2⟩
  • Rohit Chadha, Vincent Cheval, Stefan Ciobaca, Steve Kremer. Automated Verification of Equivalence Properties of Cryptographic Protocols. [Technical Report] Inria. 2012. ⟨inria-00632564v4⟩
  • Véronique Cortier, Steve Kremer, Bogdan Warinschi. A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems. [Research Report] RR-6912, INRIA. 2009, pp.42. ⟨inria-00379776⟩

Habilitation à diriger des recherches1 document

  • Steve Kremer. Modelling and analyzing security protocols in cryptographic process calculi. Computer Science [cs]. École normale supérieure de Cachan - ENS Cachan, 2011. ⟨tel-00636769⟩