Steve Kremer's Publications
• Edited Books and Proceedings • Chapters in Books • Journals • Conferences • Theses • Other Publications • Contract Reports •
Edited Books and Proceedings
- Martín Abadi and Steve Kremer, editors. Proceedings of 3rd International Conference on Principles of Security and Trust (POST'14), Lecture Notes in Computer Science 8414, Springer, Grenoble, France, April 2014.
doi:10.1007/978-3-642-54792-8
Details BibTeX Download: [HTML] - Véronique Cortier and Steve Kremer, editors. Formal Models and Techniques for Analyzing Security Protocols, Cryptology and Information Security Series 5, IOS Press, 2011.
Details BibTeX Download: [HTML] - Michele Boreale and Steve Kremer, editors. Proceedings of the 7th International Workshop on Security Issues in Concurrency (SecCo'09), Electronic Proceedings in Theoretical Computer Science 7, Bologna, Italy, August 2009.
doi:10.4204/EPTCS.7
Details BibTeX Download: [HTML] - Steve Kremer and Prakash Panangaden, editors. Proceedings of the 6th International Workshop on Security Issues in Concurrency (SecCo'08), Electronic Notes in Theoretical Computer Science 242, Elsevier Science Publishers, Toronto, Canada, August 2009.
doi:10.1016/j.entcs.2009.07.077
Details BibTeX Download: [HTML] - Liqun Chen, Steve Kremer, and Mark D. Ryan, editors. Formal Protocol Verification Applied, Dagstuhl Seminar Proceedings 07421, Dagstuhl, Germany, 2008.
Details BibTeX Download: [HTML] - Véronique Cortier and Steve Kremer, editors. Proceedings of the 2nd Workshop on Formal and Computational Cryptography (FCC'06), Venice, Italy, July 2006.
Details BibTeX Download: [HTML]
Chapters in Books
- Véronique Cortier and Steve Kremer. Formal Models for Analyzing Security Protocols: Some Lecture Notes. In Javier Esparza, Orna Grumberg, and Salomon Sickert, editors, Dependable Software Systems Engineering, NATO Science for Peace and Security Series - D: Information and Communication Securit, pp. 33–58, IOS Press, 2016.
doi:10.3233/978-1-61499-627-9-33
Details BibTeX Download: [HTML] - Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. In David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Mirosław Kutyłowski, and Ben Adida, editors, Towards Trustworthy Elections -- New Directions in Electronic Voting, Lecture Notes in Computer Science, pp. 289–309, Springer, May 2010.
doi:10.1007/978-3-642-12980-3_18
Details BibTeX Download: [pdf] [HTML]
Journals
- Vincent Cheval, Steve Kremer, and Itsaka Rakotonirina. DeepSec: Deciding Equivalence Properties for Security Protocols -- Improved theory and practice. TheoretiCS, 3, 2024.
doi:10.46298/theoretics.24.4
Details BibTeX Download: [pdf] [HTML] - Vincent Cheval, Raphaëlle Crubillé, and Steve Kremer. Symbolic protocol verification with dice --- process equivalences in the presence of probabilities. Journal of Computer Security, pp. 1–38, 2023.
doi:10.3233/JCS-230037
Details BibTeX Download: [pdf] [HTML] - Gilles Barthe, Charlie Jacomme, and Steve Kremer. Universal equivalence and majority on probabilistic programs over finite fields. ACM Transactions on Computational Logic, 23(1):1–42, January 2022.
doi:10.1145/3487063
Details BibTeX Download: [pdf] [HTML] - Charlie Jacomme and Steve Kremer. An Extensive Formal Analysis of Multi-factor Authentication Protocols. ACM Transactions on Privacy and Security, 24(2):13:1–13:34, January 2021.
doi:10.1145/3440712
Details BibTeX Download: [pdf] [HTML] - Kushal Babel, Vincent Cheval, and Steve Kremer. On the semantics of communications when verifying equivalence properties. Journal of Computer Security, 28(1):71–127, 2020.
doi:10.3233/JCS-191366
Details BibTeX Download: [pdf] [HTML] - Rohit Chadha, Vincent Cheval, Ștefan Ciobâcă, and Steve Kremer. Automated verification of equivalence properties of cryptographic protocol. ACM Transactions on Computational Logic, 17(4):1–32, November 2016. Listed in ACM Computing Reviews' 21st Annual Best of Computing list of notable books and articles for 2016.
doi:10.1145/2926715
Details BibTeX Download: [pdf] [HTML] - Steve Kremer and Robert Künnemann. Automated analysis of security protocols with global state. Journal of Computer Security, 24(5):583–616, IOS Press, 2016.
doi:10.3233/JCS-160556
Details BibTeX Download: [pdf] [HTML] - Myrto Arapinis, Stéphanie Delaune, and Steve Kremer. Dynamic Tags for Security Protocols. Logical Methods in Computer Science, 10(2), 2014.
doi:10.2168/LMCS-10(2:11)2014
Details BibTeX Download: [pdf] [HTML] - Véronique Cortier and Steve Kremer. Formal Models and Techniques for Analyzing Security Protocols: A Tutorial. Foundations and Trends in Programming Languages, 1(3):151–267, 2014.
doi:10.1561/2500000001
Details BibTeX Download: [pdf] [HTML] - Céline Chevalier, Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Composition of Password-based Protocols. Formal Methods in System Design, 43(3):369–413, 2013.
doi:10.1007/s10703-013-0184-6
Details BibTeX Download: [pdf] [HTML] - Ștefan Ciobâcă, Stéphanie Delaune, and Steve Kremer. Computing knowledge in security protocols under convergent equational theories. Journal of Automated Reasoning, 48(2):219–262, Springer, 2012.
doi:10.1007/s10817-010-9197-7
Details BibTeX Download: [pdf] [HTML] - Steve Kremer, Antoine Mercier, and Ralf Treinen. Reducing Equational Theories for the Decision of Static Equivalence. Journal of Automated Reasoning, 48(2):197–217, Springer, 2012.
doi:10.1007/s10817-010-9203-0
Details BibTeX Download: [pdf] [HTML] - Véronique Cortier, Steve Kremer, and Bogdan Warinschi. A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems. Journal of Automated Reasoning, 46(3-4):225–259, Springer, April 2010.
doi:10.1007/s10817-010-9187-9
Details BibTeX Download: [pdf] [HTML] - Stéphanie Delaune, Steve Kremer, and Graham Steel. Formal Analysis of PKCS#11 and Proprietary Extensions. Journal of Computer Security, 18(6):1211–1245, IOS Press, November 2010.
doi:10.3233/JCS-2009-0394
Details BibTeX Download: [pdf] [HTML] - Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Symbolic bisimulation for the applied pi calculus. Journal of Computer Security, 18(2):317–377, IOS Press, March 2010.
doi:10.3233/JCS-2010-0363
Details BibTeX Download: [pdf] [HTML] - Steve Kremer and Laurent Mazaré. Computationally Sound Analysis of Protocols using Bilinear Pairings. Journal of Computer Security, 18(6):999–1033, IOS Press, November 2010.
doi:10.3233/JCS-2009-0388
Details BibTeX Download: [pdf] [HTML] - Mathieu Baudet, Véronique Cortier, and Steve Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries. Information and Computation, 207(4):496–520, Elsevier Science Publishers, April 2009.
doi:10.1016/j.ic.2008.12.005
Details BibTeX Download: [pdf] [HTML] - Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Verifying Privacy-type Properties of Electronic Voting Protocols. Journal of Computer Security, 17(4):435–487, IOS Press, July 2009.
doi:10.3233/JCS-2009-0340
Details BibTeX Download: [pdf] [ps] [HTML] - Jean Cardinal, Steve Kremer, and Stefan Langerman. Juggling with Pattern Matching. Theory of Computing Systems, 39(3):425–437, Springer, June 2006.
doi:10.1007/s00224-005-1239-x
Details BibTeX Download: [pdf] [HTML] - Rohit Chadha, Steve Kremer, and Andre Scedrov. Formal Analysis of Multi-Party Contract Signing. Journal of Automated Reasoning, 36(1-2):39–83, Springer, January 2006.
doi:10.1007/s10817-005-9019-5
Details BibTeX Download: [pdf] [HTML] - Steve Kremer and Olivier Markowitch. Fair Multi-Party Non-Repudiation Protocols. International Journal on Information Security, 1(4):223–235, Springer, July 2003.
Details BibTeX Download: [ps] - Steve Kremer and Jean-François Raskin. A Game-Based Verification of Non-Repudiation and Fair Exchange Protocols. Journal of Computer Security, 11(3):399–429, IOS Press, 2003.
Details BibTeX Download: [ps] - Steve Kremer, Olivier Markowitch, and Jianying Zhou. An Intensive Survey of Fair Non-repudiation Protocols. Computer Communications, 25(17):1606–1621, Elsevier Science Publishers, November 2002.
Details BibTeX Download: [pdf]
Conferences
- Max Ammann, Lucca Hirschi, and Steve Kremer. DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing. In Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P'24), IEEE Computer Society Press, San Francisco, CA, USA, May 2024. To appear.
doi:10.1109/SP54263.2024.00096
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, and Steve Kremer. Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses. In 32nd USENIX Security Symposium (USENIX Security'23), USENIX Association, Anaheim, CA, USA, August 2023. Distinguished paper award.
Details BibTeX Download: [pdf] [pdf (long version)] - Charlie Jacomme, Steve Kremer, Elise Klein, and Maïwenn Racouchot. A comprehensive, formal and automated analysis of the EDHOC protocol. In 32nd USENIX Security Symposium (USENIX Security'23), USENIX Association, Anaheim, CA, USA, August 2023.
Details BibTeX Download: [pdf] - Vincent Cheval, Raphaëlle Crubillé, and Steve Kremer. Symbolic protocol verification with dice: process equivalences in the presence of probabilities. In Proceedings of the 35th IEEE Computer Security Foundations Symposium (CSF'22), pp. 303–318, IEEE Computer Society Press, Haifa, Israel, August 2022.
doi:10.1109/CSF54842.2022.00020
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Vincent Cheval, Charlie Jacomme, Steve Kremer, and Robert Künnemann. Sapic+ : protocol verifiers of the world, unite!. In 31st USENIX Security Symposium (USENIX Security'22), pp. 3935–3952, USENIX Association, Boston, USA, August 2022.
Details BibTeX Download: [pdf (long version)] - Gilles Barthe, Charlie Jacomme, and Steve Kremer. Universal equivalence and majority on probabilistic programs over finite fields. In Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS'20), pp. 155–166, ACM, Saarbrücken, July 2020.
doi:10.1145/3373718.3394746
Details BibTeX Download: [pdf (long version)] [HTML] - Vincent Cheval, Steve Kremer, and Itsaka Rakotonirina. The hitchhiker's guide to decidability and complexity of equivalence properties in security protocols. In Logic, Language, and Security. Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday, pp. 127–145, Lecture Notes in Computer Science 12300, Springer, 2020.
doi:10.1007/978-3-030-62077-6_10
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Gilles Barthe, Benjamin Grégoire, Charlie Jacomme, Steve Kremer, and Pierre-Yves Strub. Symbolic Methods in Computational Cryptography Proofs. In Proceedings of the 32nd IEEE Computer Security Foundations Symposium (CSF'19), pp. 136–151, IEEE Computer Society Press, Hoboken, NJ, USA, June 2019.
doi:10.1109/CSF.2019.00017
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Sergiu Bursuc and Steve Kremer. Contingent payments on a public ledger: models and reductions for automated verification. In Proceedings of the 24th European Symposium on Research in Computer Security, Part I (ESORICS'19), pp. 361–382, Lecture Notes in Computer Science 11735, Springer, Luxembourg, September 2019.
doi:10.1007/978-3-030-29959-0_18
Details BibTeX Download: [pdf] [HTML] - Sergiu Bursuc, Constantin-Cătălin Drăgan, and Steve Kremer. Private votes on untrusted platforms: models, attacks and provable scheme. In Proceedings of the 4th IEEE European Symposium on Security and Privacy (EuroS&P'19), IEEE Computer Society Press, Stockholm, Sweden, June 2019.
doi:10.1109/EuroSP.2019.00050
Details BibTeX Download: [pdf] [HTML] - Vincent Cheval, Steve Kremer, and Itsaka Rakotonirina. Exploiting Symmetries When Proving Equivalence Properties for Security Protocols. In Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS'19), pp. 905–922, ACM, London, UK, November 2019.
doi:10.1145/3319535.3354260
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Vincent Cheval, Steve Kremer, and Itsaka Rakotonirina. DEEPSEC: Deciding Equivalence Properties in Security Protocols - Theory and Practice. In Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P'18), pp. 525–542, IEEE Computer Society Press, San Francisco, CA, USA, May 2018. Distinguished paper award.
doi:10.1109/SP.2018.00033
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Vincent Cheval, Steve Kremer, and Itsaka Rakotonirina. The DEEPSEC prover. In Proceedings of the 30th International Conference on Computer Aided Verification, Part II (CAV'18), Springer, Oxford, UK, July 2018.
doi:10.1007/978-3-319-96142-2_4
Details BibTeX Download: [pdf] [HTML] - Charlie Jacomme and Steve Kremer. An extensive formal analysis of multi-factor authentication protocols. In Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'18), pp. 1–15, IEEE Computer Society Press, Oxford, UK, July 2018.
doi:10.1109/CSF.2018.00008
Details BibTeX Download: [pdf] [HTML] - Kushal Babel, Vincent Cheval, and Steve Kremer. On communication models when verifying equivalence properties. In Proceedings of the 6th International Conference on Principles of Security and Trust (POST'17), pp. 141–163, Lecture Notes in Computer Science 10204, Springer, Uppsala, Sweden, April 2017. Best paper nominee.
doi:10.1007/978-3-662-54455-6
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Michael Backes, Jannik Dreier, Steve Kremer, and Robert Künnemann. A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), pp. 76–91, IEEE Computer Society, Paris, France, April 2017.
doi:10.1109/EuroSP.2017.12
Details BibTeX Download: [pdf] [HTML] - David Baelde, Stéphanie Delaune, Ivan Gazeau, and Steve Kremer. Symbolic verification of privacy-type properties for security protocols with XOR. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pp. 234–248, IEEE Computer Society Press, Santa Barbara, USA, August 2017.
doi:10.1109/CSF.2017.22
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Stéphanie Delaune, Steve Kremer, and Ludovic Robin. Formal verification of protocols based on short authenticated strings. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pp. 130–143, IEEE Computer Society Press, Santa Barbara, USA, August 2017.
doi:10.1109/CSF.2017.26
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Jannik Dreier, Charles Duménil, Steve Kremer, and Ralf Sasse. Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols. In Proceedings of the 6th International Conference on Principles of Security and Trust (POST'17), pp. 117–140, Lecture Notes in Computer Science 10204, Springer, Uppsala, Sweden, April 2017.
doi:10.1007/978-3-662-54455-6_6
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Ivan Gazeau and Steve Kremer. Automated analysis of equivalence properties for security protocols using else branches. In Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS'17), pp. 1–20, Lecture Notes in Computer Science 10493, Springer, Oslo, Norway, September 2017.
doi:10.1007/978-3-319-66399-9_1
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Charlie Jacomme, Steve Kremer, and Guillaume Scerri. Symbolic Models for Isolated Execution Environments. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), pp. 530–545, IEEE Computer Society, Paris, France, April 2017.
doi:10.1109/EuroSP.2017.16
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Myrto Arapinis, Véronique Cortier, and Steve Kremer. When are three voters enough for privacy properties?. In Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS'16), pp. 241–260, Lecture Notes in Computer Science 9879, Springer, Heraklion, Crete, September 2016.
doi:10.1007/978-3-319-45741-3_13
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Steve Kremer and Peter Rønne. To Du or not to Du: A Security Analysis of Du-Vote. In Proceedings of the 1st IEEE European Symposium on Security and Privacy (EuroS&P'16), pp. 303–323, IEEE Computer Society, Saarbrücken, Germany, March 2016.
doi:10.1109/EuroSP.2016.42
Details BibTeX Download: [pdf] [HTML] - Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, and Cyrille Wiedling. Type-Based Verification of Electronic Voting Protocols. In Proceedings of the 4th Conference on Principles of Security and Trust (POST'15), pp. 303–323, Lecture Notes in Computer Science 9036, Springer, London, UK, April 2015.
doi:10.1007/978-3-662-46666-7_16
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Steve Kremer and Robert Künnemann. Automated Analysis of Security Protocols with Global State. In Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P'14), pp. 163–178, IEEE Computer Society Press, San Jose, CA, USA, May 2014.
doi:10.1109/SP.2014.18
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Myrto Arapinis, Véronique Cortier, Steve Kremer, and Mark D. Ryan. Practical Everlasting Privacy. In Proceedings of the 2nd Conference on Principles of Security and Trust (POST'13), pp. 21–40, Lecture Notes in Computer Science 7796, Springer, Rome, Italy, March 2013.
doi:10.1007/978-3-642-36830-1_2
Details BibTeX Download: [pdf] [HTML] - Steve Kremer, Robert Künnemann, and Graham Steel. Universally Composable Key-Management. In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS'13), pp. 327–344, Lecture Notes in Computer Science 8134, Springer, Egham, UK, September 2013.
doi:10.1007/978-3-642-40203-6_19
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Rohit Chadha, Ștefan Ciobâcă, and Steve Kremer. Automated verification of equivalence properties of cryptographic protocols. In Programming Languages and Systems ---Proceedings of the 21th European Symposium on Programming (ESOP'12), pp. 108–127, Lecture Notes in Computer Science 7211, Springer, Tallinn, Estonia, March 2012.
doi:10.1007/978-3-642-28869-2_6
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Stéphanie Delaune, Steve Kremer, and Daniel Pasaila. Security protocols, constraint systems, and group theories. In Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12), pp. 164–178, Lecture Notes in Artificial Intelligence 7364, Springer, Manchester, UK, June 2012.
doi:10.1007/978-3-642-31365-3_15
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Céline Chevalier, Stéphanie Delaune, and Steve Kremer. Transforming Password Protocols to Compose. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), pp. 204–216, Leibniz International Proceedings in Informatics, Leibniz-Zentrum für Informatik, Mumbai, India, December 2011.
Details BibTeX Download: [pdf] [pdf (long version)] - Stéphanie Delaune, Steve Kremer, Mark D. Ryan, and Graham Steel. Formal analysis of protocols based on TPM state registers. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11), pp. 66–82, IEEE Computer Society Press, Cernay-la-Ville, France, June 2011.
doi:10.1109/CSF.2011.12
Details BibTeX Download: [pdf] [HTML] - Steve Kremer, Graham Steel, and Bogdan Warinschi. Security for Key Management Interfaces. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11), pp. 266–280, IEEE Computer Society Press, Cernay-la-Ville, France, June 2011.
doi:10.1109/CSF.2011.25
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Stéphanie Delaune, Steve Kremer, Mark D. Ryan, and Graham Steel. A Formal Analysis of Authentication in the TPM. In Revised Selected Papers of the 7th International Workshop on Formal Aspects in Security and Trust (FAST'10), pp. 111–125, Lecture Notes in Computer Science 6561, Springer, Pisa, Italy, September 2010.
doi:10.1007/978-3-642-19751-2_8
Details BibTeX Download: [pdf] [ps] [HTML] - Steve Kremer, Mark D. Ryan, and Ben Smyth. Election verifiability in electronic voting protocols. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS'10), pp. 389–404, Lecture Notes in Computer Science 6345, Springer, Athens, Greece, September 2010.
doi:10.1007/978-3-642-15497-3_24
Details BibTeX Download: [pdf] [HTML] - Ben Smyth, Mark D. Ryan, Steve Kremer, and Mounira Kourjieh. Towards automatic analysis of election verifiability properties. In Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10), pp. 146–163, Lecture Notes in Computer Science 6186, Springer, Paphos, Cyprus, October 2010.
doi:10.1007/978-3-642-16074-5_11
Details BibTeX Download: [pdf] [HTML] - Rohit Chadha, Stéphanie Delaune, and Steve Kremer. Epistemic Logic for the Applied Pi Calculus. In Proceedings of IFIP International Conference on Formal Techniques for Distributed Systems (FMOODS/FORTE'09), pp. 182–197, Lecture Notes in Computer Science 5522, Springer, Lisbon, Portugal, June 2009.
doi:10.1007/978-3-642-02138-1_12
Details BibTeX Download: [pdf] [ps] [HTML] - Ștefan Ciobâcă, Stéphanie Delaune, and Steve Kremer. Computing knowledge in security protocols under convergent equational theories. In Proceedings of the 22nd International Conference on Automated Deduction (CADE'09), pp. 355–370, Lecture Notes in Artificial Intelligence, Springer, Montreal, Canada, August 2009.
doi:10.1007/978-3-642-02959-2_27
Details BibTeX Download: [pdf] [pdf (long version)] [ps (long version)] [HTML] - Stéphanie Delaune, Steve Kremer, and Olivier Pereira. Simulation based security in the applied pi calculus. In Proceedings of the 29th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'09), pp. 169–180, Leibniz International Proceedings in Informatics 4, Leibniz-Zentrum für Informatik, Kanpur, India, December 2009.
doi:10.4230/LIPIcs.FSTTCS.2009.2316
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Steve Kremer, Antoine Mercier, and Ralf Treinen. Reducing Equational Theories for the Decision of Static Equivalence. In Proceedings of the 13th Asian Computing Science Conference (ASIAN'09), pp. 94–108, Lecture Notes in Computer Science 5913, Springer, Seoul, Korea, December 2009.
doi:10.1007/978-3-642-10622-4_8
Details BibTeX Download: [pdf] [pdf (long version)] [ps] [HTML] - Myrto Arapinis, Stéphanie Delaune, and Steve Kremer. From One Session to Many: Dynamic Tags for Security Protocols. In Proceedings of the 15th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'08), pp. 128–142, Lecture Notes in Artificial Intelligence 5330, Springer, Doha, Qatar, November 2008.
doi:10.1007/978-3-540-89439-1_9
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Composition of Password-based Protocols. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pp. 239–251, IEEE Computer Society Press, Pittsburgh, PA, USA, June 2008.
doi:10.1109/CSF.2008.6
Details BibTeX Download: [pdf] [HTML] - Stéphanie Delaune, Steve Kremer, and Graham Steel. Formal Analysis of PKCS#11. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pp. 331–344, IEEE Computer Society Press, Pittsburgh, PA, USA, June 2008.
doi:10.1109/CSF.2008.16
Details BibTeX Download: [pdf] [pdf (long version)] [ps (long version)] [HTML] - Steve Kremer. Computational soundness of equational theories (Tutorial). In Revised Selected Papers from the 3rd Symposium on Trustworthy Global Computing (TGC'07), pp. 363–382, Lecture Notes in Computer Science 4912, Springer, Sophia-Antipolis, France, 2008. Invited tutorial.
doi:10.1007/978-3-540-78663-4
Details BibTeX Download: [pdf] [HTML] - Steve Kremer, Antoine Mercier, and Ralf Treinen. Proving Group Protocols Secure Against Eavesdroppers. In Proceedings of the 4th International Joint Conference on Automated Reasoning (IJCAR'08), pp. 116–131, Lecture Notes in Artificial Intelligence 5195, Springer-Verlag, Sydney, Australia, August 2008.
doi:10.1007/978-3-540-71070-7_9
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Symbolic Bisimulation for the Applied Pi-Calculus. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), pp. 133–145, Lecture Notes in Computer Science 4855, Springer, New Delhi, India, December 2007.
doi:10.1007/978-3-540-77050-3_11
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Steve Kremer and Laurent Mazaré. Adaptive Soundness of Static Equivalence. In Proceedings of the 12th European Symposium on Research in Computer Security (ESORICS'07), pp. 610–625, Lecture Notes in Computer Science 4734, Springer, Dresden, Germany, September 2007.
doi:10.1007/978-3-540-74835-9_40
Details BibTeX Download: [pdf] [pdf (long version)] [HTML] - Véronique Cortier, Steve Kremer, Ralf Küsters, and Bogdan Warinschi. Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), pp. 176–187, Lecture Notes in Computer Science 4337, Springer, Kolkata, India, December 2006.
doi:10.1007/11944836_18
Details BibTeX Download: [pdf] [pdf (long version)] [ps] [ps (long version)] [HTML] - Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Coercion-Resistance and Receipt-Freeness in Electronic Voting. In Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp. 28–39, IEEE Computer Society Press, Venice, Italy, July 2006.
doi:10.1109/CSFW.2006.8
Details BibTeX Download: [pdf] [pdf (long version)] [ps] [ps (long version)] [HTML] - Mathieu Baudet, Véronique Cortier, and Steve Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries. In Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), pp. 652–663, Lecture Notes in Computer Science 3580, Springer, Lisboa, Portugal, July 2005.
doi:10.1007/11523468_53
Details BibTeX Download: [pdf] [pdf (long version)] [ps (long version)] [HTML] - Steve Kremer and Mark D. Ryan. Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks. In Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'04), pp. 84–107, Electronic Notes in Theoretical Computer Science 128, Elsevier Science Publishers, London, UK, May 2005.
doi:10.1016/j.entcs.2004.11.043
Details BibTeX Download: [pdf] [HTML] - Steve Kremer and Mark D. Ryan. Analysis of an Electronic Voting Protocol in the Applied Pi-Calculus. In Programming Languages and Systems --- Proceedings of the 14th European Symposium on Programming (ESOP'05), pp. 186–200, Lecture Notes in Computer Science 3444, Springer, Edinburgh, Scotland, UK, April 2005.
doi:10.1007/b107380
Details BibTeX Download: [pdf] [ps] [HTML] - Aybek Mukhamedov, Steve Kremer, and Eike Ritter. Analysis of a Multi-Party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model. In Revised Papers from the 9th International Conference on Financial Cryptography and Data Security (FC'05), pp. 255–269, Lecture Notes in Computer Science 3570, Springer, Roseau, The Commonwealth Of Dominica, August 2005.
doi:10.1007/11507840_23
Details BibTeX Download: [pdf] [HTML] - Jean Cardinal, Steve Kremer, and Stefan Langerman. Juggling with Pattern Matching. In Proceedings of the 3rd International Conference on Fun with Algorithms (FUN'04), pp. 147–158, Edizioni Plus, Università di Pisa, Isola d'Elba, Italy, May 2004.
Details BibTeX Download: [ps] - Rohit Chadha, Steve Kremer, and Andre Scedrov. Formal Analysis of Multi-Party Contract Signing. In Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW'04), pp. 266–279, IEEE Computer Society Press, Asilomar, Pacific Grove, California, USA, June 2004.
Details BibTeX Download: [ps] - Shahrokh Saeednia, Steve Kremer, and Olivier Markowitch. An Efficient Strong Designated Verifier Signature Scheme. In Revised Papers of the 6th International Conference on Information Security and Cryptology (ICISC'03), pp. 40–54, Lecture Notes in Computer Science 2971, Springer, Seoul, Korea, 2004.
Details BibTeX Download: [ps] - Olivier Markowitch, Dieter Gollmann, and Steve Kremer. On Fairness in Exchange Protocols. In Revised Papers of the 5th International Conference on Information Security and Cryptology (ICISC'02), pp. 451–464, Lecture Notes in Computer Science 2587, Springer, Seoul, Korea, 2003.
Details BibTeX Download: [ps] - Steve Kremer and Jean-François Raskin. Game Analysis of Abuse-Free Contract Signing. In Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02), pp. 206–220, IEEE Computer Society Press, Cape Breton, Nova Scotia, Canada, June 2002.
Details BibTeX Download: [ps] - Steve Kremer and Olivier Markowitch. Selective Receipt in Certified E-Mail. In Proceedings of the 2nd International Conference on Cryptology in India (INDOCRYPT'01), pp. 136–148, Lecture Notes in Computer Science 2247, Springer, Chennai, India, December 2001.
Details BibTeX Download: [ps] - Steve Kremer and Jean-François Raskin. A Game-Based Verification of Non-Repudiation and Fair Exchange Protocols. In Proceedings of the 12th International Conference on Concurrency Theory (CONCUR'01), pp. 551–565, Lecture Notes in Computer Science 2154, Springer, Aalborg, Denmark, August 2001.
Details BibTeX Download: [ps] - Olivier Markowitch and Steve Kremer. A multi-party optimistic non-repudiation protocol. In Proceedings of the 3rd International Conference on Information Security and Cryptology (ICISC 2000), pp. 109–122, Lecture Notes in Computer Science 2015, Springer, Seoul, Korea, 2001.
Details BibTeX Download: [ps] - Olivier Markowitch and Steve Kremer. An Optimistic Non-Repudiation Protocol with Transparent Trusted Third Party. In Proceedings of the 4th International Conference on Information Security (ISC'01), pp. 363–378, Lecture Notes in Computer Science 2200, Springer, Malaga, Spain, October 2001.
Details BibTeX Download: [ps]
Theses
- Steve Kremer. Modelling and analyzing security protocols in cryptographic process calculi. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, 2011.
Details BibTeX Download: [pdf] - Steve Kremer. Formal Analysis of Optimistic Fair Exchange Protocols. Thèse de doctorat, Université Libre de Bruxelles, Belgium, 2003.
Details BibTeX Download: [ps]
Other Publications
- Stéphanie Delaune, Steve Kremer, Mark D. Ryan, and Graham Steel. A Formal Analysis of Authentication in the TPM (short paper). In Preliminary Proceedings of the 8th International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'10), Paris, France, August 2010.
Details BibTeX Download: [pdf] [ps] - Ștefan Ciobâcă, Stéphanie Delaune, and Steve Kremer. Computing knowledge in security protocols under convergent equational theories. In Preliminary Proceedings of the 4th International Workshop on Security and Rewriting Techniques (SecReT'09), pp. 47–58, Port Jefferson, NY, USA, July 2009.
Details BibTeX Download: [pdf] - Steve Kremer, Antoine Mercier, and Ralf Treinen. Reducing Equational Theories for the Decision of Static Equivalence (Preliminary Version). In Preliminary Proceedings of the 4th International Workshop on Security and Rewriting Techniques (SecReT'09), Port Jefferson, NY, USA, July 2009.
Details BibTeX Download: [pdf] [ps] - Ben Smyth, Mark D. Ryan, Steve Kremer, and Mounira Kourjieh. Election verifiability in electronic voting protocols (Preliminary version). In Proceedings of the 4th Benelux Workshop on Information and System Security (WISSEC'09), Louvain-la-Neuve, Belgium, November 2009.
Details BibTeX Download: [pdf] - Stéphanie Delaune, Steve Kremer, and Graham Steel. Formal Analysis of PKCS#11. In Proceedings of the 4th Taiwanese-French Conference on Information Technology (TFIT'08), pp. 267–278, Taipei, Taiwan, March 2008. Invited talk.
Details BibTeX Download: [pdf] - Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Symbolic bisimulation for the applied pi calculus. In Preliminary Proceedings of the 5th International Workshop on Security Issues in Concurrency (SecCo'07), Lisbon, Portugal, September 2007.
Details BibTeX Download: [pdf] [pdf (long version)] - Steve Kremer and Laurent Mazaré. Adaptive Soundness of Static Equivalence. In Proceedings of the 3rd Workshop on Formal and Computational Cryptography (FCC'07), Venice, Italy, July 2007.
Details BibTeX Download: [pdf] - Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Verifying Properties of Electronic Voting Protocols. In Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE'06), pp. 45–52, Cambridge, UK, June 2006.
Details BibTeX Download: [pdf] [ps] - Steve Kremer. Formal Verification of Cryptographic Protocols. Invited tutorial, 7th School on Modelling and Verifying Parallel Processes (MOVEP'06), Bordeaux, France, June 2006. 5 pages.
Details BibTeX Download: [pdf] - Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Receipt-Freeness: Formal Definition and Fault Attacks (Extended Abstract). In Proceedings of the Workshop Frontiers in Electronic Elections (FEE 2005), Milan, Italy, September 2005.
Details BibTeX Download: [pdf] - Rohit Chadha, Steve Kremer, and Andre Scedrov. Formal Analysis of Multi-Party Contract Signing. In Preliminary Proceedings of the 4th IFIP WG1.7 Workshop on Issues in the Theory of Security (WITS'04), pp. 153–163, Barcelona, Spain, April 2004.
Details BibTeX Download: [ps] - Shahrokh Saeednia, Steve Kremer, and Olivier Markowitch. Efficient Designated Verifier Signatures. In Proceedings of the 24th Symposium on Information Theory in the Benelux, pp. 187–194, Veldhoven, The Netherlands, May 2003.
Details BibTeX Download: [ps]
Contract Reports
- Véronique Cortier and Steve Kremer. Results on a real life case study - Helios 2.0.. Deliverable AVOTE 4.3, (ANR-07-SESU-002), January 2012. 116 pages.
Details BibTeX Download: [pdf] - Steve Kremer. Implementation of prototypes for equivalence properties. Deliverable AVOTE 2.3, (ANR-07-SESU-002), January 2012. 96 pages.
Details BibTeX Download: [pdf] - Steve Kremer. Results on case studies from literature. Deliverable AVOTE 4.2, (ANR-07-SESU-002), January 2011. 96 pages.
Details BibTeX Download: [pdf] - Véronique Cortier, Steve Kremer, and Pascal Lafourcade. Computational soundness of static equivalence. Deliverable AVOTE 3.1, (ANR-07-SESU-002), March 2010. 106 pages.
Details BibTeX Download: [pdf] - Stéphanie Delaune and Steve Kremer. Formalising security properties in electronic voting protocols. Deliverable AVOTE 1.2, (ANR-07-SESU-002), April 2010. 17 pages.
Details BibTeX Download: [pdf] - Stéphanie Delaune and Steve Kremer. Spécificités des protocoles de vote électronique. Deliverable AVOTE 1.1 (ANR-07-SESU-002), January 2009. 8 pages.
Details BibTeX Download: [pdf] - Francis Klay, Liana Bozga, Yassine Lakhnech, Laurent Mazaré, Stéphanie Delaune, and Steve Kremer. Retour d'expérience sur la validation du vote électronique. Technical Report 9, projet RNTL PROUVÉ, 2006. 47 pages.
Details BibTeX Download: [pdf] - Stéphanie Delaune, Francis Klay, and Steve Kremer. Spécification du protocole de vote électronique. Technical Report 6, projet RNTL PROUVÉ, 2005. 19 pages.
Details BibTeX Download: [pdf] [ps] - Steve Kremer, Yassine Lakhnech, and Ralf Treinen. The Prouvé Manual: Specifications, Semantics, and Logics. Technical Report 7, projet RNTL PROUVÉ, 2005. 49 pages.
Details BibTeX Download: [pdf] [ps]