Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Vincent Cheval
@article{DBLP:journals/pacmpl/BunaMargineanCSW24, author = {Alex Buna{-}Marginean and Vincent Cheval and Mahsa Shirmohammadi and James Worrell}, title = {On Learning Polynomial Recursive Programs}, journal = {Proc. {ACM} Program. Lang.}, volume = {8}, number = {{POPL}}, pages = {1001--1027}, year = {2024}, url = {https://doi.org/10.1145/3632876}, doi = {10.1145/3632876}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/BunaMargineanCSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/theoretics/ChevalKR24, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, title = {DeepSec: Deciding Equivalence Properties for Security Protocols - Improved theory and practice}, journal = {TheoretiCS}, volume = {3}, year = {2024}, url = {https://doi.org/10.46298/theoretics.24.4}, doi = {10.46298/THEORETICS.24.4}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/theoretics/ChevalKR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChevalCK23, author = {Vincent Cheval and Rapha{\"{e}}lle Crubill{\'{e}} and Steve Kremer}, title = {Symbolic protocol verification with dice}, journal = {J. Comput. Secur.}, volume = {31}, number = {5}, pages = {501--538}, year = {2023}, url = {https://doi.org/10.3233/JCS-230037}, doi = {10.3233/JCS-230037}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/ChevalCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChevalCD23, author = {Vincent Cheval and V{\'{e}}ronique Cortier and Alexandre Debant}, title = {Election Verifiability with ProVerif}, booktitle = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik, Croatia, July 10-14, 2023}, pages = {43--58}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSF57540.2023.00032}, doi = {10.1109/CSF57540.2023.00032}, timestamp = {Tue, 05 Sep 2023 20:33:27 +0200}, biburl = {https://dblp.org/rec/conf/csfw/ChevalCD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChevalR23, author = {Vincent Cheval and Itsaka Rakotonirina}, title = {Indistinguishability Beyond Diff-Equivalence in ProVerif}, booktitle = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik, Croatia, July 10-14, 2023}, pages = {184--199}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSF57540.2023.00036}, doi = {10.1109/CSF57540.2023.00036}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/ChevalR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ChevalMR23, author = {Vincent Cheval and Jos{\'{e}} Moreira and Mark Ryan}, title = {Automatic verification of transparency protocols}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {107--121}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00016}, doi = {10.1109/EUROSP57164.2023.00016}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ChevalMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChevalCDHJK23, author = {Vincent Cheval and Cas Cremers and Alexander Dax and Lucca Hirschi and Charlie Jacomme and Steve Kremer}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5899--5916}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/cheval}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChevalCDHJK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-04500, author = {Vincent Cheval and Jos{\'{e}} Moreira and Mark Ryan}, title = {Automatic verification of transparency protocols (extended version)}, journal = {CoRR}, volume = {abs/2303.04500}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.04500}, doi = {10.48550/ARXIV.2303.04500}, eprinttype = {arXiv}, eprint = {2303.04500}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-04500.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-14725, author = {Alex Buna{-}Marginean and Vincent Cheval and Mahsa Shirmohammadi and James Worrell}, title = {On Learning Polynomial Recursive Programs}, journal = {CoRR}, volume = {abs/2310.14725}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.14725}, doi = {10.48550/ARXIV.2310.14725}, eprinttype = {arXiv}, eprint = {2310.14725}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-14725.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BhargavanCW22, author = {Karthikeyan Bhargavan and Vincent Cheval and Christopher A. Wood}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {A Symbolic Analysis of Privacy for {TLS} 1.3 with Encrypted Client Hello}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {365--379}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559360}, doi = {10.1145/3548606.3559360}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BhargavanCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChevalCK22, author = {Vincent Cheval and Rapha{\"{e}}lle Crubill{\'{e}} and Steve Kremer}, title = {Symbolic protocol verification with dice: process equivalences in the presence of probabilities}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {319--334}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919644}, doi = {10.1109/CSF54842.2022.9919644}, timestamp = {Fri, 11 Nov 2022 16:53:14 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChevalCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BlanchetCC22, author = {Bruno Blanchet and Vincent Cheval and V{\'{e}}ronique Cortier}, title = {ProVerif with Lemmas, Induction, Fast Subsumption, and Much More}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {69--86}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833653}, doi = {10.1109/SP46214.2022.9833653}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/BlanchetCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChevalJKK22, author = {Vincent Cheval and Charlie Jacomme and Steve Kremer and Robert K{\"{u}}nnemann}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {{SAPIC+:} protocol verifiers of the world, unite!}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3935--3952}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/cheval}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChevalJKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-03225, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, title = {DeepSec: Deciding Equivalence Properties for Security Protocols - Improved theory and practice}, journal = {CoRR}, volume = {abs/2211.03225}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.03225}, doi = {10.48550/ARXIV.2211.03225}, eprinttype = {arXiv}, eprint = {2211.03225}, timestamp = {Wed, 09 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-03225.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChevalJKK22, author = {Vincent Cheval and Charlie Jacomme and Steve Kremer and Robert K{\"{u}}nnemann}, title = {Sapic+: protocol verifiers of the world, unite!}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {741}, year = {2022}, url = {https://eprint.iacr.org/2022/741}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChevalJKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChevalCDHJK22, author = {Vincent Cheval and Cas Cremers and Alexander Dax and Lucca Hirschi and Charlie Jacomme and Steve Kremer}, title = {Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1314}, year = {2022}, url = {https://eprint.iacr.org/2022/1314}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChevalCDHJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BabelCK20, author = {Kushal Babel and Vincent Cheval and Steve Kremer}, title = {On the semantics of communications when verifying equivalence properties}, journal = {J. Comput. Secur.}, volume = {28}, number = {1}, pages = {71--127}, year = {2020}, url = {https://doi.org/10.3233/JCS-191366}, doi = {10.3233/JCS-191366}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BabelCK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ChevalKR20, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, editor = {Vivek Nigam and Tajana Ban Kirigin and Carolyn L. Talcott and Joshua D. Guttman and Stepan L. Kuznetsov and Boon Thau Loo and Mitsuhiro Okada}, title = {The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols}, booktitle = {Logic, Language, and Security - Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {12300}, pages = {127--145}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62077-6\_10}, doi = {10.1007/978-3-030-62077-6\_10}, timestamp = {Sun, 12 Feb 2023 18:48:21 +0100}, biburl = {https://dblp.org/rec/conf/birthday/ChevalKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChevalKR19, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Exploiting Symmetries When Proving Equivalence Properties for Security Protocols}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {905--922}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354260}, doi = {10.1145/3319535.3354260}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChevalKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ChevalKR18, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, editor = {Hana Chockler and Georg Weissenbacher}, title = {The {DEEPSEC} Prover}, booktitle = {Computer Aided Verification - 30th International Conference, {CAV} 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10982}, pages = {28--36}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96142-2\_4}, doi = {10.1007/978-3-319-96142-2\_4}, timestamp = {Fri, 09 Apr 2021 18:35:26 +0200}, biburl = {https://dblp.org/rec/conf/cav/ChevalKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChevalCT18, author = {Vincent Cheval and V{\'{e}}ronique Cortier and Mathieu Turuani}, title = {A Little More Conversation, a Little Less Action, a Lot More Satisfaction: Global States in ProVerif}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {344--358}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00032}, doi = {10.1109/CSF.2018.00032}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChevalCT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChevalKR18, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, title = {{DEEPSEC:} Deciding Equivalence Properties in Security Protocols Theory and Practice}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {529--546}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00033}, doi = {10.1109/SP.2018.00033}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChevalKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ChevalCD17, author = {Vincent Cheval and Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune}, title = {A procedure for deciding symbolic equivalence between sets of constraint systems}, journal = {Inf. Comput.}, volume = {255}, pages = {94--125}, year = {2017}, url = {https://doi.org/10.1016/j.ic.2017.05.004}, doi = {10.1016/J.IC.2017.05.004}, timestamp = {Mon, 31 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/ChevalCD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChevalCW17, author = {Vincent Cheval and V{\'{e}}ronique Cortier and Bogdan Warinschi}, title = {Secure Composition of PKIs with Public Key Protocols}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {144--158}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.28}, doi = {10.1109/CSF.2017.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChevalCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BabelCK17, author = {Kushal Babel and Vincent Cheval and Steve Kremer}, editor = {Matteo Maffei and Mark Ryan}, title = {On Communication Models When Verifying Equivalence Properties}, booktitle = {Principles of Security and Trust - 6th International Conference, {POST} 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10204}, pages = {141--163}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54455-6\_7}, doi = {10.1007/978-3-662-54455-6\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/BabelCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuCR16, author = {Jiangshan Yu and Vincent Cheval and Mark Ryan}, title = {{DTKI:} {A} New Formalized {PKI} with Verifiable Trusted Parties}, journal = {Comput. J.}, volume = {59}, number = {11}, pages = {1695--1713}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxw039}, doi = {10.1093/COMJNL/BXW039}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/YuCR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/ChadhaCCK16, author = {Rohit Chadha and Vincent Cheval and {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and Steve Kremer}, title = {Automated Verification of Equivalence Properties of Cryptographic Protocols}, journal = {{ACM} Trans. Comput. Log.}, volume = {17}, number = {4}, pages = {23}, year = {2016}, url = {https://doi.org/10.1145/2926715}, doi = {10.1145/2926715}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tocl/ChadhaCCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/ChevalCM15, author = {Vincent Cheval and V{\'{e}}ronique Cortier and Eric le Morvan}, editor = {Prahladh Harsha and G. Ramalingam}, title = {Secure Refinements of Communication Channels}, booktitle = {35th {IARCS} Annual Conference on Foundation of Software Technology and Theoretical Computer Science, {FSTTCS} 2015, December 16-18, 2015, Bangalore, India}, series = {LIPIcs}, volume = {45}, pages = {575--589}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2015}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2015.575}, doi = {10.4230/LIPICS.FSTTCS.2015.575}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/ChevalCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ChevalC15, author = {Vincent Cheval and V{\'{e}}ronique Cortier}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {280--299}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_15}, doi = {10.1007/978-3-662-46666-7\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ChevalC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ArapinisCD15, author = {Myrto Arapinis and Vincent Cheval and St{\'{e}}phanie Delaune}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Composing Security Protocols: From Confidentiality to Privacy}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {324--343}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_17}, doi = {10.1007/978-3-662-46666-7\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ArapinisCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/Cheval14, author = {Vincent Cheval}, editor = {Erika {\'{A}}brah{\'{a}}m and Klaus Havelund}, title = {{APTE:} An Algorithm for Proving Trace Equivalence}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 20th International Conference, {TACAS} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8413}, pages = {587--592}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54862-8\_50}, doi = {10.1007/978-3-642-54862-8\_50}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/Cheval14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/ChevalDR14, author = {Vincent Cheval and St{\'{e}}phanie Delaune and Mark Ryan}, editor = {Matteo Maffei and Emilio Tuosto}, title = {Tests for Establishing Security Properties}, booktitle = {Trustworthy Global Computing - 9th International Symposium, {TGC} 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8902}, pages = {82--96}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45917-1\_6}, doi = {10.1007/978-3-662-45917-1\_6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tgc/ChevalDR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ArapinisCD14, author = {Myrto Arapinis and Vincent Cheval and St{\'{e}}phanie Delaune}, title = {Composing security protocols: from confidentiality to privacy}, journal = {CoRR}, volume = {abs/1407.5444}, year = {2014}, url = {http://arxiv.org/abs/1407.5444}, eprinttype = {arXiv}, eprint = {1407.5444}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ArapinisCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/YuCR14, author = {Jiangshan Yu and Vincent Cheval and Mark Ryan}, title = {{DTKI:} a new formalized {PKI} with no trusted parties}, journal = {CoRR}, volume = {abs/1408.1023}, year = {2014}, url = {http://arxiv.org/abs/1408.1023}, eprinttype = {arXiv}, eprint = {1408.1023}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/YuCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ChevalCD13, author = {Vincent Cheval and V{\'{e}}ronique Cortier and St{\'{e}}phanie Delaune}, title = {Deciding equivalence-based properties using constraint solving}, journal = {Theor. Comput. Sci.}, volume = {492}, pages = {1--39}, year = {2013}, url = {https://doi.org/10.1016/j.tcs.2013.04.016}, doi = {10.1016/J.TCS.2013.04.016}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ChevalCD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ChevalCP13, author = {Vincent Cheval and V{\'{e}}ronique Cortier and Antoine Plet}, editor = {Natasha Sharygina and Helmut Veith}, title = {Lengths May Break Privacy - Or How to Check for Equivalences with Length}, booktitle = {Computer Aided Verification - 25th International Conference, {CAV} 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8044}, pages = {708--723}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39799-8\_50}, doi = {10.1007/978-3-642-39799-8\_50}, timestamp = {Wed, 07 Dec 2022 23:12:58 +0100}, biburl = {https://dblp.org/rec/conf/cav/ChevalCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ChevalB13, author = {Vincent Cheval and Bruno Blanchet}, editor = {David A. Basin and John C. Mitchell}, title = {Proving More Observational Equivalences with ProVerif}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {226--246}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_12}, doi = {10.1007/978-3-642-36830-1\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ChevalB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Cheval12, author = {Vincent Cheval}, title = {Automatic verification of cryptographic protocols : privacy-type properties. (V{\'{e}}rification automatique des protocoles cryptographiques : propri{\'{e}}t{\'{e}}s d'{\'{e}}quivalence)}, school = {{\'{E}}cole normale sup{\'{e}}rieure de Cachan, France}, year = {2012}, url = {https://tel.archives-ouvertes.fr/tel-00861389}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Cheval12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ArapinisCD12, author = {Myrto Arapinis and Vincent Cheval and St{\'{e}}phanie Delaune}, editor = {Stephen Chong}, title = {Verifying Privacy-Type Properties in a Modular Way}, booktitle = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge, MA, USA, June 25-27, 2012}, pages = {95--109}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSF.2012.16}, doi = {10.1109/CSF.2012.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ArapinisCD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChevalCD11, author = {Vincent Cheval and Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Trace equivalence decision: negative tests and non-determinism}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {321--330}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046744}, doi = {10.1145/2046707.2046744}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChevalCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/ChevalCD10, author = {Vincent Cheval and Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune}, editor = {J{\"{u}}rgen Giesl and Reiner H{\"{a}}hnle}, title = {Automating Security Analysis: Symbolic Equivalence of Constraint Systems}, booktitle = {Automated Reasoning, 5th International Joint Conference, {IJCAR} 2010, Edinburgh, UK, July 16-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6173}, pages = {412--426}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14203-1\_35}, doi = {10.1007/978-3-642-14203-1\_35}, timestamp = {Wed, 25 Sep 2019 18:19:14 +0200}, biburl = {https://dblp.org/rec/conf/cade/ChevalCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.