Travelled to:
1 × Australia
1 × Canada
1 × Estonia
1 × Portugal
2 × United Kingdom
Collaborated with:
S.Ciobaca S.Delaune M.Ryan R.Chadha D.Pasaila A.Mercier R.Treinen M.Baudet V.Cortier V.Cheval I.Rakotonirina
Talks about:
protocol (5) theori (3) secur (3) against (2) comput (2) group (2) equat (2) cryptograph (1) eavesdropp (1) constraint (1)
Person: Steve Kremer
DBLP: Kremer:Steve
Contributed to:
Wrote 7 papers:
- ESOP-2012-ChadhaCK #automation #encryption #equivalence #protocol #verification
- Automated Verification of Equivalence Properties of Cryptographic Protocols (RC, SC, SK), pp. 108–127.
- IJCAR-2012-DelauneKP #constraints #protocol #security
- Security Protocols, Constraint Systems, and Group Theories (SD, SK, DP), pp. 164–178.
- CADE-2009-CiobacaDK #convergence #equation #protocol #security
- Computing Knowledge in Security Protocols under Convergent Equational Theories (SC, SD, SK), pp. 355–370.
- IJCAR-2008-KremerMT #protocol #proving
- Proving Group Protocols Secure Against Eavesdroppers (SK, AM, RT), pp. 116–131.
- ESOP-2005-KremerR #analysis #protocol #π-calculus
- Analysis of an Electronic Voting Protocol in the Applied π Calculus (SK, MR), pp. 186–200.
- ICALP-2005-BaudetCK #equation #implementation
- Computationally Sound Implementations of Equational Theories Against Passive Adversaries (MB, VC, SK), pp. 652–663.
- CAV-2018-ChevalKR #proving
- The DEEPSEC Prover (VC, SK, IR), pp. 28–36.