Suivre
Vincent Cheval
Vincent Cheval
University of Oxford, United Kingdom
Adresse e-mail validée de cs.ox.ac.uk - Page d'accueil
Titre
Citée par
Citée par
Année
ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial
B Blanchet, B Smyth, V Cheval, M Sylvestre
Version from, 05-16, 2018
317*2018
Automated verification of equivalence properties of cryptographic protocols
R Chadha, V Cheval, Ş Ciobâcă, S Kremer
ACM Transactions on Computational Logic (TOCL) 17 (4), 1-32, 2016
1932016
ProVerif: Cryptographic protocol verifier in the formal model
B Blanchet, V Cheval, X Allamigeon, B Smyth
1622010
Proving more observational equivalences with ProVerif
V Cheval, B Blanchet
International conference on principles of security and trust, 226-246, 2013
992013
Trace equivalence decision: Negative tests and non-determinism
V Cheval, H Comon-Lundh, S Delaune
Proceedings of the 18th ACM conference on Computer and communications …, 2011
912011
DEEPSEC: deciding equivalence properties in security protocols theory and practice
V Cheval, S Kremer, I Rakotonirina
2018 IEEE symposium on security and privacy (SP), 529-546, 2018
882018
Deciding equivalence-based properties using constraint solving
V Cheval, V Cortier, S Delaune
Theoretical Computer Science 492, 1-39, 2013
802013
DTKI: A new formalized PKI with verifiable trusted parties
J Yu, V Cheval, M Ryan
The Computer Journal 59 (11), 1695-1713, 2016
792016
Apte: an algorithm for proving trace equivalence
V Cheval
Tools and Algorithms for the Construction and Analysis of Systems: 20th …, 2014
692014
A little more conversation, a little less action, a lot more satisfaction: Global states in proverif
V Cheval, V Cortier, M Turuani
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 344-358, 2018
452018
Proverif with lemmas, induction, fast subsumption, and much more
B Blanchet, V Cheval, V Cortier
2022 IEEE Symposium on Security and Privacy (SP), 69-86, 2022
412022
Automating security analysis: symbolic equivalence of constraint systems
V Cheval, H Comon-Lundh, S Delaune
Automated Reasoning: 5th International Joint Conference, IJCAR 2010 …, 2010
402010
Proverif: Automatic cryptographic protocol verifier
B Blanchet, B Smyth, V Cheval, M Sylvestre
User Manual and Tutorial, 2016
332016
The DEEPSEC prover
V Cheval, S Kremer, I Rakotonirina
Computer Aided Verification: 30th International Conference, CAV 2018, Held …, 2018
302018
Verifying privacy-type properties in a modular way
M Arapinis, V Cheval, S Delaune
2012 IEEE 25th Computer Security Foundations Symposium, 95-109, 2012
282012
Composing security protocols: from confidentiality to privacy
M Arapinis, V Cheval, S Delaune
International Conference on Principles of Security and Trust, 324-343, 2015
262015
Lengths may break privacy–or how to check for equivalences with length
V Cheval, V Cortier, A Plet
25*
Proverif 1.90: Automatic cryptographic protocol verifier, user manual and tutorial (2015)
B Blanchet, B Smyth, V Cheval
Originally appeared as Bruno Blanchet and Ben Smyth, 2011
242011
A procedure for deciding symbolic equivalence between sets of constraint systems
V Cheval, H Comon-Lundh, S Delaune
Information and Computation 255, 94-125, 2017
222017
{SAPIC+}: protocol verifiers of the world, unite!
V Cheval, C Jacomme, S Kremer, R Künnemann
31st USENIX Security Symposium (USENIX Security 22), 3935-3952, 2022
212022
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20