default search action
Steve Kremer
Person information
- affiliation: INRIA Nancy - Grand Est, France
- affiliation (former): ENS Cachan, Paris, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Steve Kremer:
Security and Privacy Column. ACM SIGLOG News 11(2): 61 (2024) - [j25]Vincent Cheval, Steve Kremer, Itsaka Rakotonirina:
DeepSec: Deciding Equivalence Properties for Security Protocols - Improved theory and practice. TheoretiCS 3 (2024) - [c63]Max Ammann, Lucca Hirschi, Steve Kremer:
DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing. SP 2024: 1481-1499 - 2023
- [j24]Vincent Cheval, Raphaëlle Crubillé, Steve Kremer:
Symbolic protocol verification with dice. J. Comput. Secur. 31(5): 501-538 (2023) - [j23]Steve Kremer:
Security and Privacy Column. ACM SIGLOG News 10(1): 3 (2023) - [c62]Charlie Jacomme, Elise Klein, Steve Kremer, Maïwenn Racouchot:
A comprehensive, formal and automated analysis of the EDHOC protocol. USENIX Security Symposium 2023: 5881-5898 - [c61]Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer:
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses. USENIX Security Symposium 2023: 5899-5916 - [i15]Max Ammann, Lucca Hirschi, Steve Kremer:
DY Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing. IACR Cryptol. ePrint Arch. 2023: 57 (2023) - 2022
- [j22]Gilles Barthe, Charlie Jacomme, Steve Kremer:
Universal Equivalence and Majority of Probabilistic Programs over Finite Fields. ACM Trans. Comput. Log. 23(1): 5:1-5:42 (2022) - [c60]Vincent Cheval, Raphaëlle Crubillé, Steve Kremer:
Symbolic protocol verification with dice: process equivalences in the presence of probabilities. CSF 2022: 319-334 - [c59]Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann:
SAPIC+: protocol verifiers of the world, unite! USENIX Security Symposium 2022: 3935-3952 - [i14]Vincent Cheval, Steve Kremer, Itsaka Rakotonirina:
DeepSec: Deciding Equivalence Properties for Security Protocols - Improved theory and practice. CoRR abs/2211.03225 (2022) - [i13]Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann:
Sapic+: protocol verifiers of the world, unite! IACR Cryptol. ePrint Arch. 2022: 741 (2022) - [i12]Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer:
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses. IACR Cryptol. ePrint Arch. 2022: 1314 (2022) - 2021
- [j21]Charlie Jacomme, Steve Kremer:
An Extensive Formal Analysis of Multi-factor Authentication Protocols. ACM Trans. Priv. Secur. 24(2): 13:1-13:34 (2021) - 2020
- [j20]Kushal Babel, Vincent Cheval, Steve Kremer:
On the semantics of communications when verifying equivalence properties. J. Comput. Secur. 28(1): 71-127 (2020) - [c58]Vincent Cheval, Steve Kremer, Itsaka Rakotonirina:
The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols. Logic, Language, and Security 2020: 127-145 - [c57]Gilles Barthe, Charlie Jacomme, Steve Kremer:
Universal equivalence and majority of probabilistic programs over finite fields. LICS 2020: 155-166
2010 – 2019
- 2019
- [c56]Vincent Cheval, Steve Kremer, Itsaka Rakotonirina:
Exploiting Symmetries When Proving Equivalence Properties for Security Protocols. CCS 2019: 905-922 - [c55]Gilles Barthe, Benjamin Grégoire, Charlie Jacomme, Steve Kremer, Pierre-Yves Strub:
Symbolic Methods in Computational Cryptography Proofs. CSF 2019: 136-151 - [c54]Sergiu Bursuc, Steve Kremer:
Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification. ESORICS (1) 2019: 361-382 - [c53]Sergiu Bursuc, Constantin Catalin Dragan, Steve Kremer:
Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme. EuroS&P 2019: 606-620 - [i11]Sergiu Bursuc, Steve Kremer:
Contingent payments on a public ledger: models and reductions for automated verification. IACR Cryptol. ePrint Arch. 2019: 443 (2019) - 2018
- [c52]Vincent Cheval, Steve Kremer, Itsaka Rakotonirina:
The DEEPSEC Prover. CAV (2) 2018: 28-36 - [c51]Charlie Jacomme, Steve Kremer:
An Extensive Formal Analysis of Multi-factor Authentication Protocols. CSF 2018: 1-15 - [c50]Vincent Cheval, Steve Kremer, Itsaka Rakotonirina:
DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice. IEEE Symposium on Security and Privacy 2018: 529-546 - 2017
- [c49]Stéphanie Delaune, Steve Kremer, Ludovic Robin:
Formal Verification of Protocols Based on Short Authenticated Strings. CSF 2017: 130-143 - [c48]David Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer:
Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR. CSF 2017: 234-248 - [c47]Ivan Gazeau, Steve Kremer:
Automated Analysis of Equivalence Properties for Security Protocols Using Else Branches. ESORICS (2) 2017: 1-20 - [c46]Michael Backes, Jannik Dreier, Steve Kremer, Robert Künnemann:
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange. EuroS&P 2017: 76-91 - [c45]Charlie Jacomme, Steve Kremer, Guillaume Scerri:
Symbolic Models for Isolated Execution Environments. EuroS&P 2017: 530-545 - [c44]Jannik Dreier, Charles Duménil, Steve Kremer, Ralf Sasse:
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols. POST 2017: 117-140 - [c43]Kushal Babel, Vincent Cheval, Steve Kremer:
On Communication Models When Verifying Equivalence Properties. POST 2017: 141-163 - [i10]Charlie Jacomme, Steve Kremer, Guillaume Scerri:
Symbolic Models for Isolated Execution Environments. IACR Cryptol. ePrint Arch. 2017: 70 (2017) - 2016
- [j19]Steve Kremer, Robert Künnemann:
Automated analysis of security protocols with global state. J. Comput. Secur. 24(5): 583-616 (2016) - [j18]Rohit Chadha, Vincent Cheval, Stefan Ciobaca, Steve Kremer:
Automated Verification of Equivalence Properties of Cryptographic Protocols. ACM Trans. Comput. Log. 17(4): 23 (2016) - [c42]Myrto Arapinis, Véronique Cortier, Steve Kremer:
When Are Three Voters Enough for Privacy Properties? ESORICS (2) 2016: 241-260 - [c41]Steve Kremer, Peter B. Rønne:
To Du or Not to Du: A Security Analysis of Du-Vote. EuroS&P 2016: 473-486 - [p2]Véronique Cortier, Steve Kremer:
Formal Models for Analyzing Security Protocols: Some Lecture Notes. Dependable Software Systems Engineering 2016: 33-58 - [i9]Myrto Arapinis, Véronique Cortier, Steve Kremer:
When Are Three Voters Enough for Privacy Properties? IACR Cryptol. ePrint Arch. 2016: 690 (2016) - 2015
- [c40]Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling:
Type-Based Verification of Electronic Voting Protocols. POST 2015: 303-323 - [i8]Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling:
Type-Based Verification of Electronic Voting Protocols. IACR Cryptol. ePrint Arch. 2015: 39 (2015) - 2014
- [j17]Myrto Arapinis, Stéphanie Delaune, Steve Kremer:
Dynamic Tags for Security Protocols. Log. Methods Comput. Sci. 10(2) (2014) - [j16]Véronique Cortier, Steve Kremer:
Formal Models and Techniques for Analyzing Security Protocols: A Tutorial. Found. Trends Program. Lang. 1(3): 151-267 (2014) - [j15]Steve Kremer, Paliath Narendran:
Foreword to the special issue on security and rewriting techniques. Inf. Comput. 238: 1 (2014) - [c39]Steve Kremer, Robert Künnemann:
Automated Analysis of Security Protocols with Global State. IEEE Symposium on Security and Privacy 2014: 163-178 - [e5]Martín Abadi, Steve Kremer:
Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings. Lecture Notes in Computer Science 8414, Springer 2014, ISBN 978-3-642-54791-1 [contents] - [i7]Steve Kremer, Robert Künnemann:
Automated analysis of security protocols with global state. CoRR abs/1403.1142 (2014) - 2013
- [j14]Céline Chevalier, Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan:
Composition of password-based protocols. Formal Methods Syst. Des. 43(3): 369-413 (2013) - [c38]Steve Kremer, Robert Künnemann, Graham Steel:
Universally Composable Key-Management. ESORICS 2013: 327-344 - [c37]Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark Ryan:
Practical Everlasting Privacy. POST 2013: 21-40 - 2012
- [j13]Steve Kremer, Antoine Mercier, Ralf Treinen:
Reducing Equational Theories for the Decision of Static Equivalence. J. Autom. Reason. 48(2): 197-217 (2012) - [j12]Stefan Ciobaca, Stéphanie Delaune, Steve Kremer:
Computing Knowledge in Security Protocols Under Convergent Equational Theories. J. Autom. Reason. 48(2): 219-262 (2012) - [c36]Stéphanie Delaune, Steve Kremer, Daniel Pasaila:
Security Protocols, Constraint Systems, and Group Theories. IJCAR 2012: 164-178 - [c35]Rohit Chadha, Stefan Ciobaca, Steve Kremer:
Automated Verification of Equivalence Properties of Cryptographic Protocols. ESOP 2012: 108-127 - [i6]Steve Kremer, Robert Künnemann, Graham Steel:
Universally Composable Key-Management. IACR Cryptol. ePrint Arch. 2012: 189 (2012) - 2011
- [b1]Steve Kremer:
Modelling and analyzing security protocols in cryptographic process calculi. École normale supérieure de Cachan, France, 2011 - [j11]Véronique Cortier, Steve Kremer, Bogdan Warinschi:
A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems. J. Autom. Reason. 46(3-4): 225-259 (2011) - [c34]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel:
Formal Analysis of Protocols Based on TPM State Registers. CSF 2011: 66-80 - [c33]Steve Kremer, Graham Steel, Bogdan Warinschi:
Security for Key Management Interfaces. CSF 2011: 266-280 - [c32]Céline Chevalier, Stéphanie Delaune, Steve Kremer:
Transforming Password Protocols to Compose. FSTTCS 2011: 204-216 - [p1]Véronique Cortier, Steve Kremer:
Introduction. Formal Models and Techniques for Analyzing Security Protocols 2011: 1-12 - [e4]Véronique Cortier, Steve Kremer:
Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security Series 5, IOS Press 2011, ISBN 978-1-60750-713-0 [contents] - 2010
- [j10]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan:
Symbolic bisimulation for the applied pi calculus. J. Comput. Secur. 18(2): 317-377 (2010) - [j9]Steve Kremer, Laurent Mazaré:
Computationally sound analysis of protocols using bilinear pairings. J. Comput. Secur. 18(6): 999-1033 (2010) - [j8]Stéphanie Delaune, Steve Kremer, Graham Steel:
Formal security analysis of PKCS#11 and proprietary extensions. J. Comput. Secur. 18(6): 1211-1245 (2010) - [c31]Steve Kremer, Mark Ryan, Ben Smyth:
Election Verifiability in Electronic Voting Protocols. ESORICS 2010: 389-404 - [c30]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel:
A Formal Analysis of Authentication in the TPM. Formal Aspects in Security and Trust 2010: 111-125 - [c29]Ben Smyth, Mark Ryan, Steve Kremer, Mounira Kourjieh:
Towards Automatic Analysis of Election Verifiability Properties. ARSPA-WITS 2010: 146-163 - [c28]Stéphanie Delaune, Steve Kremer, Mark Ryan:
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. Towards Trustworthy Elections 2010: 289-309
2000 – 2009
- 2009
- [j7]Mathieu Baudet, Véronique Cortier, Steve Kremer:
Computationally sound implementations of equational theories against passive adversaries. Inf. Comput. 207(4): 496-520 (2009) - [j6]Stéphanie Delaune, Steve Kremer, Mark Ryan:
Verifying privacy-type properties of electronic voting protocols. J. Comput. Secur. 17(4): 435-487 (2009) - [c27]Steve Kremer, Antoine Mercier, Ralf Treinen:
Reducing Equational Theories for the Decision of Static Equivalence. ASIAN 2009: 94-108 - [c26]Stefan Ciobaca, Stéphanie Delaune, Steve Kremer:
Computing Knowledge in Security Protocols under Convergent Equational Theories. CADE 2009: 355-370 - [c25]Rohit Chadha, Stéphanie Delaune, Steve Kremer:
Epistemic Logic for the Applied Pi Calculus. FMOODS/FORTE 2009: 182-197 - [c24]Stéphanie Delaune, Steve Kremer, Olivier Pereira:
Simulation based security in the applied pi calculus. FSTTCS 2009: 169-180 - [e3]Steve Kremer, Prakash Panangaden:
Proceedings of the 6th Workshop on Security Issues in Concurrency, SecCo@CONCUR 2008, Toronto, ON, Canada, August 23, 2008. Electronic Notes in Theoretical Computer Science 242(3), Elsevier 2009 [contents] - [e2]Michele Boreale, Steve Kremer:
Proceedings 7th International Workshop on Security Issues in Concurrency, SECCO 2009, Bologna, Italy, 5th September 2009. EPTCS 7, 2009 [contents] - [i5]Stéphanie Delaune, Steve Kremer, Olivier Pereira:
Simulation based security in the applied pi calculus. IACR Cryptol. ePrint Arch. 2009: 267 (2009) - 2008
- [c23]Steve Kremer, Antoine Mercier, Ralf Treinen:
Proving Group Protocols Secure Against Eavesdroppers. IJCAR 2008: 116-131 - [c22]Stéphanie Delaune, Steve Kremer, Mark Ryan:
Composition of Password-Based Protocols. CSF 2008: 239-251 - [c21]Stéphanie Delaune, Steve Kremer, Graham Steel:
Formal Analysis of PKCS#11. CSF 2008: 331-344 - [c20]Myrto Arapinis, Stéphanie Delaune, Steve Kremer:
From One Session to Many: Dynamic Tags for Security Protocols. LPAR 2008: 128-142 - [c19]Steve Kremer, Prakash Panangaden:
Preface. SecCo@CONCUR 2008: 1-2 - [e1]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
Formal Protocol Verification Applied, 14.10. - 19.10.2007. Dagstuhl Seminar Proceedings 07421, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - 2007
- [c18]Steve Kremer, Laurent Mazaré:
Adaptive Soundness of Static Equivalence. ESORICS 2007: 610-625 - [c17]Stéphanie Delaune, Steve Kremer, Mark Ryan:
Symbolic Bisimulation for the Applied Pi Calculus. FSTTCS 2007: 133-145 - [c16]Steve Kremer:
Computational Soundness of Equational Theories (Tutorial). TGC 2007: 363-382 - [i4]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
07421 Executive Summary -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007 - [i3]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
07421 Abstracts Collection -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007 - 2006
- [j5]Rohit Chadha, Steve Kremer, Andre Scedrov:
Formal Analysis of Multiparty Contract Signing. J. Autom. Reason. 36(1-2): 39-83 (2006) - [j4]Jean Cardinal, Steve Kremer, Stefan Langerman:
Juggling with Pattern Matching. Theory Comput. Syst. 39(3): 425-437 (2006) - [c15]Stéphanie Delaune, Steve Kremer, Mark Ryan:
Coercion-Resistance and Receipt-Freeness in Electronic Voting. CSFW 2006: 28-42 - [c14]Véronique Cortier, Steve Kremer, Ralf Küsters, Bogdan Warinschi:
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. FSTTCS 2006: 176-187 - [i2]Véronique Cortier, Steve Kremer, Ralf Küsters, Bogdan Warinschi:
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. IACR Cryptol. ePrint Arch. 2006: 218 (2006) - 2005
- [c13]Steve Kremer, Mark Ryan:
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. ESOP 2005: 186-200 - [c12]Aybek Mukhamedov, Steve Kremer, Eike Ritter:
Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model. Financial Cryptography 2005: 255-269 - [c11]Mathieu Baudet, Véronique Cortier, Steve Kremer:
Computationally Sound Implementations of Equational Theories Against Passive Adversaries. ICALP 2005: 652-663 - [i1]Mathieu Baudet, Véronique Cortier, Steve Kremer:
Computationally sound implementations of equational theories against passive adversaries. IACR Cryptol. ePrint Arch. 2005: 74 (2005) - 2004
- [c10]Rohit Chadha, Steve Kremer, Andre Scedrov:
Formal Analysis of Multi-Party Contract Signing. CSFW 2004: 266-265 - [c9]Steve Kremer, Mark Ryan:
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks. SecCo 2004: 87-104 - 2003
- [j3]Steve Kremer, Olivier Markowitch:
Fair multi-party non-repudiation protocols. Int. J. Inf. Sec. 1(4): 223-235 (2003) - [j2]Steve Kremer, Jean-François Raskin:
A Game-based Verification of Non-repudiation and Fair Exchange Protocols. J. Comput. Secur. 11(3): 399-430 (2003) - [c8]Shahrokh Saeednia, Steve Kremer, Olivier Markowitch:
An Efficient Strong Designated Verifier Signature Scheme. ICISC 2003: 40-54 - 2002
- [j1]Steve Kremer, Olivier Markowitch, Jianying Zhou:
An intensive survey of fair non-repudiation protocols. Comput. Commun. 25(17): 1606-1621 (2002) - [c7]Steve Kremer, Jean-François Raskin:
Game Analysis of Abuse-free Contract Signing. CSFW 2002: 206- - [c6]Olivier Markowitch, Dieter Gollmann, Steve Kremer:
On Fairness in Exchange Protocols. ICISC 2002: 451-464 - 2001
- [c5]Steve Kremer, Jean-François Raskin:
A Game-Based Verification of Non-repudiation and Fair Exchange Protocols. CONCUR 2001: 551-565 - [c4]Steve Kremer, Olivier Markowitch:
Selective Receipt in Certified E-mail. INDOCRYPT 2001: 136-148 - [c3]Olivier Markowitch, Steve Kremer:
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. ISC 2001: 363-378 - 2000
- [c2]Olivier Markowitch, Steve Kremer:
A Multi-party Optimistic Non-repudiation Protocol. ICISC 2000: 109-122 - [c1]Steve Kremer, Olivier Markowitch:
A Multi-Party Non-Repudiation Protocol. SEC 2000: 271-280
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint