BibTeX records: Vincent Cheval

download as .bib file

@article{DBLP:journals/pacmpl/BunaMargineanCSW24,
  author       = {Alex Buna{-}Marginean and
                  Vincent Cheval and
                  Mahsa Shirmohammadi and
                  James Worrell},
  title        = {On Learning Polynomial Recursive Programs},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {8},
  number       = {{POPL}},
  pages        = {1001--1027},
  year         = {2024},
  url          = {https://doi.org/10.1145/3632876},
  doi          = {10.1145/3632876},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/BunaMargineanCSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/theoretics/ChevalKR24,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  title        = {DeepSec: Deciding Equivalence Properties for Security Protocols -
                  Improved theory and practice},
  journal      = {TheoretiCS},
  volume       = {3},
  year         = {2024},
  url          = {https://doi.org/10.46298/theoretics.24.4},
  doi          = {10.46298/THEORETICS.24.4},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/theoretics/ChevalKR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChevalCK23,
  author       = {Vincent Cheval and
                  Rapha{\"{e}}lle Crubill{\'{e}} and
                  Steve Kremer},
  title        = {Symbolic protocol verification with dice},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {501--538},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230037},
  doi          = {10.3233/JCS-230037},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/ChevalCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChevalCD23,
  author       = {Vincent Cheval and
                  V{\'{e}}ronique Cortier and
                  Alexandre Debant},
  title        = {Election Verifiability with ProVerif},
  booktitle    = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik,
                  Croatia, July 10-14, 2023},
  pages        = {43--58},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSF57540.2023.00032},
  doi          = {10.1109/CSF57540.2023.00032},
  timestamp    = {Tue, 05 Sep 2023 20:33:27 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/ChevalCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChevalR23,
  author       = {Vincent Cheval and
                  Itsaka Rakotonirina},
  title        = {Indistinguishability Beyond Diff-Equivalence in ProVerif},
  booktitle    = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik,
                  Croatia, July 10-14, 2023},
  pages        = {184--199},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSF57540.2023.00036},
  doi          = {10.1109/CSF57540.2023.00036},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/ChevalR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ChevalMR23,
  author       = {Vincent Cheval and
                  Jos{\'{e}} Moreira and
                  Mark Ryan},
  title        = {Automatic verification of transparency protocols},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {107--121},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00016},
  doi          = {10.1109/EUROSP57164.2023.00016},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ChevalMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChevalCDHJK23,
  author       = {Vincent Cheval and
                  Cas Cremers and
                  Alexander Dax and
                  Lucca Hirschi and
                  Charlie Jacomme and
                  Steve Kremer},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Hash Gone Bad: Automated discovery of protocol attacks that exploit
                  hash function weaknesses},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5899--5916},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/cheval},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChevalCDHJK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-04500,
  author       = {Vincent Cheval and
                  Jos{\'{e}} Moreira and
                  Mark Ryan},
  title        = {Automatic verification of transparency protocols (extended version)},
  journal      = {CoRR},
  volume       = {abs/2303.04500},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.04500},
  doi          = {10.48550/ARXIV.2303.04500},
  eprinttype    = {arXiv},
  eprint       = {2303.04500},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-04500.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-14725,
  author       = {Alex Buna{-}Marginean and
                  Vincent Cheval and
                  Mahsa Shirmohammadi and
                  James Worrell},
  title        = {On Learning Polynomial Recursive Programs},
  journal      = {CoRR},
  volume       = {abs/2310.14725},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.14725},
  doi          = {10.48550/ARXIV.2310.14725},
  eprinttype    = {arXiv},
  eprint       = {2310.14725},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-14725.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BhargavanCW22,
  author       = {Karthikeyan Bhargavan and
                  Vincent Cheval and
                  Christopher A. Wood},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {A Symbolic Analysis of Privacy for {TLS} 1.3 with Encrypted Client
                  Hello},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {365--379},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559360},
  doi          = {10.1145/3548606.3559360},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BhargavanCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChevalCK22,
  author       = {Vincent Cheval and
                  Rapha{\"{e}}lle Crubill{\'{e}} and
                  Steve Kremer},
  title        = {Symbolic protocol verification with dice: process equivalences in
                  the presence of probabilities},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {319--334},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919644},
  doi          = {10.1109/CSF54842.2022.9919644},
  timestamp    = {Fri, 11 Nov 2022 16:53:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChevalCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BlanchetCC22,
  author       = {Bruno Blanchet and
                  Vincent Cheval and
                  V{\'{e}}ronique Cortier},
  title        = {ProVerif with Lemmas, Induction, Fast Subsumption, and Much More},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {69--86},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833653},
  doi          = {10.1109/SP46214.2022.9833653},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BlanchetCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChevalJKK22,
  author       = {Vincent Cheval and
                  Charlie Jacomme and
                  Steve Kremer and
                  Robert K{\"{u}}nnemann},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {{SAPIC+:} protocol verifiers of the world, unite!},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3935--3952},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/cheval},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChevalJKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-03225,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  title        = {DeepSec: Deciding Equivalence Properties for Security Protocols -
                  Improved theory and practice},
  journal      = {CoRR},
  volume       = {abs/2211.03225},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.03225},
  doi          = {10.48550/ARXIV.2211.03225},
  eprinttype    = {arXiv},
  eprint       = {2211.03225},
  timestamp    = {Wed, 09 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-03225.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChevalJKK22,
  author       = {Vincent Cheval and
                  Charlie Jacomme and
                  Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {Sapic+: protocol verifiers of the world, unite!},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {741},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/741},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChevalJKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChevalCDHJK22,
  author       = {Vincent Cheval and
                  Cas Cremers and
                  Alexander Dax and
                  Lucca Hirschi and
                  Charlie Jacomme and
                  Steve Kremer},
  title        = {Hash Gone Bad: Automated discovery of protocol attacks that exploit
                  hash function weaknesses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1314},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1314},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChevalCDHJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BabelCK20,
  author       = {Kushal Babel and
                  Vincent Cheval and
                  Steve Kremer},
  title        = {On the semantics of communications when verifying equivalence properties},
  journal      = {J. Comput. Secur.},
  volume       = {28},
  number       = {1},
  pages        = {71--127},
  year         = {2020},
  url          = {https://doi.org/10.3233/JCS-191366},
  doi          = {10.3233/JCS-191366},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BabelCK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ChevalKR20,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  editor       = {Vivek Nigam and
                  Tajana Ban Kirigin and
                  Carolyn L. Talcott and
                  Joshua D. Guttman and
                  Stepan L. Kuznetsov and
                  Boon Thau Loo and
                  Mitsuhiro Okada},
  title        = {The Hitchhiker's Guide to Decidability and Complexity of Equivalence
                  Properties in Security Protocols},
  booktitle    = {Logic, Language, and Security - Essays Dedicated to Andre Scedrov
                  on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {12300},
  pages        = {127--145},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62077-6\_10},
  doi          = {10.1007/978-3-030-62077-6\_10},
  timestamp    = {Sun, 12 Feb 2023 18:48:21 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/ChevalKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChevalKR19,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Exploiting Symmetries When Proving Equivalence Properties for Security
                  Protocols},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {905--922},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354260},
  doi          = {10.1145/3319535.3354260},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChevalKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ChevalKR18,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  editor       = {Hana Chockler and
                  Georg Weissenbacher},
  title        = {The {DEEPSEC} Prover},
  booktitle    = {Computer Aided Verification - 30th International Conference, {CAV}
                  2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford,
                  UK, July 14-17, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10982},
  pages        = {28--36},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96142-2\_4},
  doi          = {10.1007/978-3-319-96142-2\_4},
  timestamp    = {Fri, 09 Apr 2021 18:35:26 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ChevalKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChevalCT18,
  author       = {Vincent Cheval and
                  V{\'{e}}ronique Cortier and
                  Mathieu Turuani},
  title        = {A Little More Conversation, a Little Less Action, a Lot More Satisfaction:
                  Global States in ProVerif},
  booktitle    = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
                  United Kingdom, July 9-12, 2018},
  pages        = {344--358},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CSF.2018.00032},
  doi          = {10.1109/CSF.2018.00032},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChevalCT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChevalKR18,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  title        = {{DEEPSEC:} Deciding Equivalence Properties in Security Protocols Theory
                  and Practice},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {529--546},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00033},
  doi          = {10.1109/SP.2018.00033},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChevalKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ChevalCD17,
  author       = {Vincent Cheval and
                  Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune},
  title        = {A procedure for deciding symbolic equivalence between sets of constraint
                  systems},
  journal      = {Inf. Comput.},
  volume       = {255},
  pages        = {94--125},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ic.2017.05.004},
  doi          = {10.1016/J.IC.2017.05.004},
  timestamp    = {Mon, 31 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/ChevalCD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChevalCW17,
  author       = {Vincent Cheval and
                  V{\'{e}}ronique Cortier and
                  Bogdan Warinschi},
  title        = {Secure Composition of PKIs with Public Key Protocols},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {144--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.28},
  doi          = {10.1109/CSF.2017.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChevalCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BabelCK17,
  author       = {Kushal Babel and
                  Vincent Cheval and
                  Steve Kremer},
  editor       = {Matteo Maffei and
                  Mark Ryan},
  title        = {On Communication Models When Verifying Equivalence Properties},
  booktitle    = {Principles of Security and Trust - 6th International Conference, {POST}
                  2017, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10204},
  pages        = {141--163},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54455-6\_7},
  doi          = {10.1007/978-3-662-54455-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BabelCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YuCR16,
  author       = {Jiangshan Yu and
                  Vincent Cheval and
                  Mark Ryan},
  title        = {{DTKI:} {A} New Formalized {PKI} with Verifiable Trusted Parties},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {11},
  pages        = {1695--1713},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxw039},
  doi          = {10.1093/COMJNL/BXW039},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/YuCR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/ChadhaCCK16,
  author       = {Rohit Chadha and
                  Vincent Cheval and
                  {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  Steve Kremer},
  title        = {Automated Verification of Equivalence Properties of Cryptographic
                  Protocols},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {17},
  number       = {4},
  pages        = {23},
  year         = {2016},
  url          = {https://doi.org/10.1145/2926715},
  doi          = {10.1145/2926715},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tocl/ChadhaCCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/ChevalCM15,
  author       = {Vincent Cheval and
                  V{\'{e}}ronique Cortier and
                  Eric le Morvan},
  editor       = {Prahladh Harsha and
                  G. Ramalingam},
  title        = {Secure Refinements of Communication Channels},
  booktitle    = {35th {IARCS} Annual Conference on Foundation of Software Technology
                  and Theoretical Computer Science, {FSTTCS} 2015, December 16-18, 2015,
                  Bangalore, India},
  series       = {LIPIcs},
  volume       = {45},
  pages        = {575--589},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2015},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2015.575},
  doi          = {10.4230/LIPICS.FSTTCS.2015.575},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/ChevalCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ChevalC15,
  author       = {Vincent Cheval and
                  V{\'{e}}ronique Cortier},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Timing Attacks in Security Protocols: Symbolic Framework and Proof
                  Techniques},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {280--299},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_15},
  doi          = {10.1007/978-3-662-46666-7\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/ChevalC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisCD15,
  author       = {Myrto Arapinis and
                  Vincent Cheval and
                  St{\'{e}}phanie Delaune},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Composing Security Protocols: From Confidentiality to Privacy},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {324--343},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_17},
  doi          = {10.1007/978-3-662-46666-7\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/ArapinisCD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/Cheval14,
  author       = {Vincent Cheval},
  editor       = {Erika {\'{A}}brah{\'{a}}m and
                  Klaus Havelund},
  title        = {{APTE:} An Algorithm for Proving Trace Equivalence},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 20th International Conference, {TACAS} 2014, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2014, Grenoble, France, April 5-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8413},
  pages        = {587--592},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54862-8\_50},
  doi          = {10.1007/978-3-642-54862-8\_50},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/Cheval14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/ChevalDR14,
  author       = {Vincent Cheval and
                  St{\'{e}}phanie Delaune and
                  Mark Ryan},
  editor       = {Matteo Maffei and
                  Emilio Tuosto},
  title        = {Tests for Establishing Security Properties},
  booktitle    = {Trustworthy Global Computing - 9th International Symposium, {TGC}
                  2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8902},
  pages        = {82--96},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45917-1\_6},
  doi          = {10.1007/978-3-662-45917-1\_6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tgc/ChevalDR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ArapinisCD14,
  author       = {Myrto Arapinis and
                  Vincent Cheval and
                  St{\'{e}}phanie Delaune},
  title        = {Composing security protocols: from confidentiality to privacy},
  journal      = {CoRR},
  volume       = {abs/1407.5444},
  year         = {2014},
  url          = {http://arxiv.org/abs/1407.5444},
  eprinttype    = {arXiv},
  eprint       = {1407.5444},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ArapinisCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/YuCR14,
  author       = {Jiangshan Yu and
                  Vincent Cheval and
                  Mark Ryan},
  title        = {{DTKI:} a new formalized {PKI} with no trusted parties},
  journal      = {CoRR},
  volume       = {abs/1408.1023},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.1023},
  eprinttype    = {arXiv},
  eprint       = {1408.1023},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/YuCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ChevalCD13,
  author       = {Vincent Cheval and
                  V{\'{e}}ronique Cortier and
                  St{\'{e}}phanie Delaune},
  title        = {Deciding equivalence-based properties using constraint solving},
  journal      = {Theor. Comput. Sci.},
  volume       = {492},
  pages        = {1--39},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.tcs.2013.04.016},
  doi          = {10.1016/J.TCS.2013.04.016},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ChevalCD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ChevalCP13,
  author       = {Vincent Cheval and
                  V{\'{e}}ronique Cortier and
                  Antoine Plet},
  editor       = {Natasha Sharygina and
                  Helmut Veith},
  title        = {Lengths May Break Privacy - Or How to Check for Equivalences with
                  Length},
  booktitle    = {Computer Aided Verification - 25th International Conference, {CAV}
                  2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8044},
  pages        = {708--723},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39799-8\_50},
  doi          = {10.1007/978-3-642-39799-8\_50},
  timestamp    = {Wed, 07 Dec 2022 23:12:58 +0100},
  biburl       = {https://dblp.org/rec/conf/cav/ChevalCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ChevalB13,
  author       = {Vincent Cheval and
                  Bruno Blanchet},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Proving More Observational Equivalences with ProVerif},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {226--246},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_12},
  doi          = {10.1007/978-3-642-36830-1\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/ChevalB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Cheval12,
  author       = {Vincent Cheval},
  title        = {Automatic verification of cryptographic protocols : privacy-type properties.
                  (V{\'{e}}rification automatique des protocoles cryptographiques
                  : propri{\'{e}}t{\'{e}}s d'{\'{e}}quivalence)},
  school       = {{\'{E}}cole normale sup{\'{e}}rieure de Cachan, France},
  year         = {2012},
  url          = {https://tel.archives-ouvertes.fr/tel-00861389},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Cheval12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArapinisCD12,
  author       = {Myrto Arapinis and
                  Vincent Cheval and
                  St{\'{e}}phanie Delaune},
  editor       = {Stephen Chong},
  title        = {Verifying Privacy-Type Properties in a Modular Way},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {95--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.16},
  doi          = {10.1109/CSF.2012.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ArapinisCD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChevalCD11,
  author       = {Vincent Cheval and
                  Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Trace equivalence decision: negative tests and non-determinism},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {321--330},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046744},
  doi          = {10.1145/2046707.2046744},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChevalCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/ChevalCD10,
  author       = {Vincent Cheval and
                  Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune},
  editor       = {J{\"{u}}rgen Giesl and
                  Reiner H{\"{a}}hnle},
  title        = {Automating Security Analysis: Symbolic Equivalence of Constraint Systems},
  booktitle    = {Automated Reasoning, 5th International Joint Conference, {IJCAR} 2010,
                  Edinburgh, UK, July 16-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6173},
  pages        = {412--426},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14203-1\_35},
  doi          = {10.1007/978-3-642-14203-1\_35},
  timestamp    = {Wed, 25 Sep 2019 18:19:14 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/ChevalCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics