Publications
See also: Google Scholar, DBLP

Journals
  • [CCCK16]
    R. Chadha, V. Cheval, S. Ciobâca and S. Kremer. Automated verification of equivalence properties of cryptographic protocols. ACM Transactions on Computational Logic , 2016. PDF | Bibtex | Abstract
  • [YCR16]
    J. Yu, V. Cheval and M. Ryan. DTKI: A New Formalized PKI with Verifiable Trusted Parties. The Computer Journal , 2016. PDF | Bibtex | Abstract
  • [CCD13]
    V. Cheval, V. Cortier and S. Delaune. Deciding equivalence-based properties using constraint solving. Theoretical Computer Science , 2013. PDF | Bibtex | Abstract
Conferences
  • [CCM15]
    V. Cheval, V. Cortier and E. Le Morvan. Secure Refinements of Communication Channels. In Proceedings of the 35th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2015), pages 575--589 Schloss Dagstuhl, 2015. PDF | PDF (long version) | Bibtex | Abstract
  • [CC15]
    V. Cheval and V. Cortier. Timing attacks: symbolic framework and proof techniques. In Proceedings of the 4nd International Conference on Principles of Security and Trust (POST'15), pages To appear Springer Berlin Heidelberg, 2015. PDF | PDF (long version) | Bibtex | Abstract
  • [ACD15]
    M. Arapinis, V. Cheval and S. Delaune. Composing security protocols: from confidentiality to privacy. In Proceedings of the 4nd International Conference on Principles of Security and Trust (POST'15), pages To appear Springer Berlin Heidelberg, 2015. PDF | PDF (long version) | Bibtex | Abstract
  • [CDR14]
    V. Cheval, S. Delaune and M. Ryan. Tests for establishing security properties. In Proceedings of the 9th Symposium on Trustworthy Global Computing (TGC'14), pages 82-96 Springer Berlin Heidelberg, 2014. PDF | Bibtex | Abstract
  • [Che14]
    V. Cheval. APTE: an Algorithm for Proving Trace Equivalence. In Proceedings of the 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'14), pages 0-0 Springer, 2014. PDF | Bibtex | Abstract
  • [CCP13]
    V. Cheval, V. Cortier and A. Plet. Lengths may break privacy -- or how to check for equivalences with length. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV'13), pages 708-723 Springer, 2013. PDF | PDF (long version) | Bibtex | Abstract
  • [CB13]
    V. Cheval and B. Blanchet. Proving More Observational Equivalences with ProVerif. In Proceedings of the 2nd International Conference on Principles of Security and Trust (POST'13), pages 226-246 Springer, 2013. PDF | PDF (long version) | Bibtex | Abstract
  • [ACD12]
    M. Arapinis, V. Cheval and S. Delaune. Verifying privacy-type properties in a modular way. In Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF'12), pages 95-109 IEEE Computer Society Press, 2012. PDF | PDF (long version) | Bibtex | Abstract
  • [CCD11]
    V. Cheval, H. Comon-Lundh and S. Delaune. Trace Equivalence Decision: Negative Tests and Non-determinism. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11), pages 321-330 ACM Press, 2011. PDF | Bibtex | Abstract
  • [CCD10]
    V. Cheval, H. Comon-Lundh and S. Delaune. Automating security analysis: symbolic equivalence of constraint systems. In Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR'10), pages 412-426 Springer-Verlag, 2010. PDF | Bibtex | Abstract
Theses
  • [Che12]
    V. Cheval. Automatic verification of cryptographic protocols: privacy-type properties. PhD Thesis, Laboratoire Specification et Verification, ENS Cachan, France, December 2012. PDF | Bibtex | Abstract
Other Publications