Vincent Cheval
Vincent Cheval
Inria Nancy, LORIA, France
Dirección de correo verificada de inria.fr - Página principal
Título
Citado por
Citado por
Año
ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial
B Blanchet, B Smyth, V Cheval, M Sylvestre
Version from, 05-16, 2018
152*2018
Automated verification of equivalence properties of cryptographic protocols
R Chadha, V Cheval, Ş Ciobâcă, S Kremer
ACM Transactions on Computational Logic (TOCL) 17 (4), 1-32, 2016
1302016
ProVerif: Cryptographic protocol verifier in the formal model
B Blanchet, V Cheval, X Allamigeon, B Smyth
URL http://prosecco. gforge. inria. fr/personal/bblanche/proverif 17, 2010
1102010
Trace equivalence decision: Negative tests and non-determinism
V Cheval, H Comon-Lundh, S Delaune
Proceedings of the 18th ACM conference on Computer and communications …, 2011
802011
Proving more observational equivalences with ProVerif
V Cheval, B Blanchet
International Conference on Principles of Security and Trust, 226-246, 2013
772013
Deciding equivalence-based properties using constraint solving
V Cheval, V Cortier, S Delaune
Theoretical Computer Science 492, 1-39, 2013
592013
Apte: an algorithm for proving trace equivalence
V Cheval
International Conference on Tools and Algorithms for the Construction and …, 2014
512014
DTKI: A new formalized PKI with verifiable trusted parties
J Yu, V Cheval, M Ryan
The Computer Journal 59 (11), 1695-1713, 2016
382016
Automating security analysis: symbolic equivalence of constraint systems
V Cheval, H Comon-Lundh, S Delaune
International Joint Conference on Automated Reasoning, 412-426, 2010
382010
DEEPSEC: deciding equivalence properties in security protocols theory and practice
V Cheval, S Kremer, I Rakotonirina
2018 IEEE Symposium on Security and Privacy (SP), 529-546, 2018
302018
Lengths may break privacy–or how to check for equivalences with length
V Cheval, V Cortier, A Plet
26*
Composing security protocols: from confidentiality to privacy
M Arapinis, V Cheval, S Delaune
International Conference on Principles of Security and Trust, 324-343, 2015
222015
Verifying privacy-type properties in a modular way
M Arapinis, V Cheval, S Delaune
2012 IEEE 25th Computer Security Foundations Symposium, 95-109, 2012
192012
Timing attacks in security protocols: symbolic framework and proof techniques
V Cheval, V Cortier
International Conference on Principles of Security and Trust, 280-299, 2015
162015
ProVerif: Automatic Cryptographic Protocol Verifier User Manual & Tutorial (2011)
B Blanchet, B Smyth
URL http://scholar. google. com/scholar, 0
15
A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif
V Cheval, V Cortier, M Turuani
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 344-358, 2018
132018
A procedure for deciding symbolic equivalence between sets of constraint systems
V Cheval, H Comon-Lundh, S Delaune
Information and Computation 255, 94-125, 2017
122017
Automatic verification of cryptographic protocols: privacy-type properties
V Cheval
ENS-Cachan, 2012
112012
The DEEPSEC prover
V Cheval, S Kremer, I Rakotonirina
International Conference on Computer Aided Verification, 28-36, 2018
102018
Proverif 2.00: Automatic cryptographic protocol verifier
B Blanchet, B Smyth, V Cheval, M Sylvestre
User Manual and Tutorial, 1-129, 2018
82018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20