Edit Profile (opens in new tab) Cortier, Véronique Co-Author Distance Author ID: cortier.veronique Published as: Cortier, Véronique; Cortier, Veronique; Cortier, Vèronique more...less Documents Indexed: 55 Publications since 1999 1 Contribution as Editor Co-Authors: 41 Co-Authors with 52 Joint Publications 647 Co-Co-Authors all top 5 Co-Authors 4 single-authored 19 Delaune, Stéphanie 7 Comon-Lundh, Hubert 6 Kremer, Steve 5 Chrétien, Rémy 5 Zălinescu, Eugen 4 Baudet, Mathieu 4 Warinschi, Bogdan 3 Arnaud, Mathilde 3 Comon, Hubert 3 Rusinowitch, Michaël 2 Abadi, Martín 2 Arapinis, Myrto 2 Cheval, Vincent 2 Dallon, Antoine 2 Scerri, Guillaume 2 Steel, Graham 1 Ben Rajeb, Narjes 1 Berrima, Mouhebeddine 1 Degrieck, Jan 1 Delaitre, Jérémie 1 Dreier, Jannik 1 Ganzinger, Harald 1 Gaudry, Pierrick 1 Glondu, Stéphane 1 Goaoc, Xavier 1 Grimm, Niklas 1 Hördegen, Heinrich 1 Jacquemard, Florent 1 Keighren, Gavin 1 Kirchner, Claude 1 Küsters, Ralf 1 Lallemand, Joseph 1 Le Morvan, Eric 1 Lee, Mira 1 Mitchell, John C. 1 Na, Hyeon-Suk 1 Okada, Mitsuhiro 1 Ryan, Mark Dermot 1 Sakurada, Hideki 1 Sundararajan, Vaishnavi 1 Veanes, Margus all top 5 Serials 4 ACM Transactions on Computational Logic 3 Theoretical Computer Science 3 Information and Computation 3 Journal of Automated Reasoning 1 Discrete Mathematics 1 Science of Computer Programming 1 Formal Methods in System Design 1 RAIRO. Theoretical Informatics and Applications 1 Lecture Notes in Computer Science 1 Logical Methods in Computer Science 1 RAIRO. Theoretical Informatics and Applications all top 5 Fields 46 Computer science (68-XX) 40 Information and communication theory, circuits (94-XX) 10 Mathematical logic and foundations (03-XX) 2 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 1 General and overarching topics; collections (00-XX) 1 Convex and discrete geometry (52-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 46 Publications have been cited 309 times in 171 Documents Cited by ▼ Year ▼ Deciding knowledge in security protocols under equational theories. Zbl 1153.94339 Abadi, Martín; Cortier, Véronique 42 2006 Flatness is not a weakness. Zbl 0973.68142 Comon, Hubert; Cortier, Vèronique 25 2000 Computationally sound implementations of equational theories against passive adversaries. Zbl 1084.94510 Baudet, Mathieu; Cortier, Véronique; Kremer, Steve 15 2005 New decidability results for fragments of first-order logic and application to cryptographic protocols. Zbl 1038.03012 Comon-Lundh, Hubert; Cortier, Véronique 15 2003 Tree automata with one memory set constraints and cryptographic protocols. Zbl 1070.68066 Comon, Hubert; Cortier, Véronique 14 2005 Computationally sound, automated proofs for security protocols. Zbl 1108.68454 Cortier, Véronique; Warinschi, Bogdan 12 2005 Deciding knowledge in security protocols under equational theories. Zbl 1099.94026 Abadi, Martín; Cortier, Véronique 12 2004 A survey of symbolic methods in computational analysis of cryptographic systems. Zbl 1213.94093 Cortier, Véronique; Kremer, Steve; Warinschi, Bogdan 11 2011 Tree automata with one memory, set constraints, and ping-pong protocols. Zbl 0986.68047 Comon, Hubert; Cortier, Véronique; Mitchell, John 10 2001 YAPA: a generic tool for computing intruder knowledge. Zbl 1242.94018 Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie 10 2009 Safely composing security protocols. Zbl 1135.68392 Cortier, Véronique; Delaitre, Jérémie; Delaune, Stéphanie 8 2007 Security properties: two agents are sufficient. Zbl 1073.68028 Comon-Lundh, Hubert; Cortier, Véronique 8 2004 Deciding knowledge in security protocols for monoidal equational theories. Zbl 1137.68325 Cortier, Véronique; Delaune, Stéphanie 8 2007 Combining algorithms for deciding knowledge in security protocols. Zbl 1148.68361 Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie 8 2007 Deciding security properties for cryptographic protocols. application to key cycles. Zbl 1351.94035 Comon-Lundh, Hubert; Cortier, Véronique; Zălinescu, Eugen 8 2010 Deciding equivalence-based properties using constraint solving. Zbl 1294.68111 Cheval, Vincent; Cortier, Véronique; Delaune, Stéphanie 8 2013 Computationally sound symbolic secrecy in the presence of hash functions. Zbl 1177.94142 Cortier, Véronique; Kremer, Steve; Küsters, Ralf; Warinschi, Bogdan 7 2006 Safely composing security protocols. Zbl 1165.68358 Cortier, Véronique; Delaune, Stéphanie 7 2009 Security properties: Two agents are sufficient. Zbl 1032.94508 Comon-Lundh, Hubert; Cortier, Véronique 6 2003 Deciding key cycles for security protocols. Zbl 1165.94319 Cortier, Véronique; Zălinescu, Eugen 6 2006 Typing messages for free in security protocols: the case of equivalence properties. Zbl 1417.68124 Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie 6 2014 YAPA: a generic tool for computing intruder knowledge. Zbl 1353.68019 Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie 6 2013 Automatic analysis of the security of XOR-based key management schemes. Zbl 1186.68180 Cortier, Véronique; Keighren, Gavin; Steel, Graham 5 2007 About the decision of reachability for register machines. Zbl 1034.68057 Cortier, Véronique 4 2002 How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones. Zbl 1230.68141 Comon-Lundh, Hubert; Cortier, Véronique 4 2011 Decidability and combination results for two notions of knowledge in security protocols. Zbl 1242.68099 Cortier, Véronique; Delaune, Stéphanie 4 2012 From security protocols to pushdown automata. Zbl 1367.68186 Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie 4 2015 Belenios: a simple private and verifiable electronic voting system. Zbl 1533.94037 Cortier, Véronique; Gaudry, Pierrick; Glondu, Stéphane 4 2019 Computationally sound implementations of equational theories against passive adversaries. Zbl 1170.68016 Baudet, Mathieu; Cortier, Véronique; Kremer, Steve 3 2009 Analysing routing protocols: four nodes topologies are sufficient. Zbl 1353.68020 Cortier, Véronique; Degrieck, Jan; Delaune, Stéphanie 3 2012 Equivalence properties by typing in cryptographic branching protocols. Zbl 1427.68035 Cortier, Véronique; Grimm, Niklas; Lallemand, Joseph; Maffei, Matteo 3 2018 Decidable fragments of simultaneous rigid reachability. Zbl 0943.68096 Cortier, Veronique; Ganzinger, Harald; Jacquemard, Florent; Veanes, Margus 2 1999 Relating two standard notions of secrecy. Zbl 1125.68046 Cortier, Véronique; Rusinowitch, Michaël; Zălinescu, Eugen 2 2007 From security protocols to pushdown automata. Zbl 1335.94040 Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie 2 2013 Practical everlasting privacy. Zbl 1390.68273 Arapinis, Myrto; Cortier, Véronique; Kremer, Steve; Ryan, Mark 2 2013 Deciding security for protocols with recursive tests. Zbl 1341.68013 Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie 2 2011 Typing messages for free in security protocols. Zbl 1433.68211 Chrétien, Rémy; Cortier, Véronique; Dallon, Antoine; Delaune, Stéphanie 2 2020 When are three voters enough for privacy properties? Zbl 1499.68045 Arapinis, Myrto; Cortier, Véronique; Kremer, Steve 2 2016 Efficiently deciding equivalence for standard primitives and phases. Zbl 1496.68060 Cortier, Véronique; Dallon, Antoine; Delaune, Stéphanie 2 2018 Relating two standard notions of secrecy. Zbl 1225.94020 Cortier, Véronique; Rusinowitch, Michaël; Zălinescu, Eugen 1 2006 Explicit randomness is not necessary when modeling probabilistic encryption. Zbl 1277.94021 Cortier, Véronique; Hördegen, Heinrich; Warinschi, Bogdan 1 2007 Deciding knowledge in security protocols under some e-voting theories. Zbl 1223.68016 Berrima, Mouhebeddine; Ben Rajeb, Narjes; Cortier, Véronique 1 2011 Security proof with dishonest keys. Zbl 1353.68070 Comon-Lundh, Hubert; Cortier, Véronique; Scerri, Guillaume 1 2012 A note on maximally repeated sub-patterns of a point set. Zbl 1097.68120 Cortier, Véronique; Goaoc, Xavier; Lee, Mira; Na, Hyeon-Suk 1 2006 Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols. Zbl 1511.68042 Cortier, Véronique; Delaune, Stéphanie; Dreier, Jannik 1 2020 Checking trace equivalence: how to get rid of nonces? Zbl 1499.68048 Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie 1 2015 Typing messages for free in security protocols. Zbl 1433.68211 Chrétien, Rémy; Cortier, Véronique; Dallon, Antoine; Delaune, Stéphanie 2 2020 Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols. Zbl 1511.68042 Cortier, Véronique; Delaune, Stéphanie; Dreier, Jannik 1 2020 Belenios: a simple private and verifiable electronic voting system. Zbl 1533.94037 Cortier, Véronique; Gaudry, Pierrick; Glondu, Stéphane 4 2019 Equivalence properties by typing in cryptographic branching protocols. Zbl 1427.68035 Cortier, Véronique; Grimm, Niklas; Lallemand, Joseph; Maffei, Matteo 3 2018 Efficiently deciding equivalence for standard primitives and phases. Zbl 1496.68060 Cortier, Véronique; Dallon, Antoine; Delaune, Stéphanie 2 2018 When are three voters enough for privacy properties? Zbl 1499.68045 Arapinis, Myrto; Cortier, Véronique; Kremer, Steve 2 2016 From security protocols to pushdown automata. Zbl 1367.68186 Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie 4 2015 Checking trace equivalence: how to get rid of nonces? Zbl 1499.68048 Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie 1 2015 Typing messages for free in security protocols: the case of equivalence properties. Zbl 1417.68124 Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie 6 2014 Deciding equivalence-based properties using constraint solving. Zbl 1294.68111 Cheval, Vincent; Cortier, Véronique; Delaune, Stéphanie 8 2013 YAPA: a generic tool for computing intruder knowledge. Zbl 1353.68019 Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie 6 2013 From security protocols to pushdown automata. Zbl 1335.94040 Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie 2 2013 Practical everlasting privacy. Zbl 1390.68273 Arapinis, Myrto; Cortier, Véronique; Kremer, Steve; Ryan, Mark 2 2013 Decidability and combination results for two notions of knowledge in security protocols. Zbl 1242.68099 Cortier, Véronique; Delaune, Stéphanie 4 2012 Analysing routing protocols: four nodes topologies are sufficient. Zbl 1353.68020 Cortier, Véronique; Degrieck, Jan; Delaune, Stéphanie 3 2012 Security proof with dishonest keys. Zbl 1353.68070 Comon-Lundh, Hubert; Cortier, Véronique; Scerri, Guillaume 1 2012 A survey of symbolic methods in computational analysis of cryptographic systems. Zbl 1213.94093 Cortier, Véronique; Kremer, Steve; Warinschi, Bogdan 11 2011 How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones. Zbl 1230.68141 Comon-Lundh, Hubert; Cortier, Véronique 4 2011 Deciding security for protocols with recursive tests. Zbl 1341.68013 Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie 2 2011 Deciding knowledge in security protocols under some e-voting theories. Zbl 1223.68016 Berrima, Mouhebeddine; Ben Rajeb, Narjes; Cortier, Véronique 1 2011 Deciding security properties for cryptographic protocols. application to key cycles. Zbl 1351.94035 Comon-Lundh, Hubert; Cortier, Véronique; Zălinescu, Eugen 8 2010 YAPA: a generic tool for computing intruder knowledge. Zbl 1242.94018 Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie 10 2009 Safely composing security protocols. Zbl 1165.68358 Cortier, Véronique; Delaune, Stéphanie 7 2009 Computationally sound implementations of equational theories against passive adversaries. Zbl 1170.68016 Baudet, Mathieu; Cortier, Véronique; Kremer, Steve 3 2009 Safely composing security protocols. Zbl 1135.68392 Cortier, Véronique; Delaitre, Jérémie; Delaune, Stéphanie 8 2007 Deciding knowledge in security protocols for monoidal equational theories. Zbl 1137.68325 Cortier, Véronique; Delaune, Stéphanie 8 2007 Combining algorithms for deciding knowledge in security protocols. Zbl 1148.68361 Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie 8 2007 Automatic analysis of the security of XOR-based key management schemes. Zbl 1186.68180 Cortier, Véronique; Keighren, Gavin; Steel, Graham 5 2007 Relating two standard notions of secrecy. Zbl 1125.68046 Cortier, Véronique; Rusinowitch, Michaël; Zălinescu, Eugen 2 2007 Explicit randomness is not necessary when modeling probabilistic encryption. Zbl 1277.94021 Cortier, Véronique; Hördegen, Heinrich; Warinschi, Bogdan 1 2007 Deciding knowledge in security protocols under equational theories. Zbl 1153.94339 Abadi, Martín; Cortier, Véronique 42 2006 Computationally sound symbolic secrecy in the presence of hash functions. Zbl 1177.94142 Cortier, Véronique; Kremer, Steve; Küsters, Ralf; Warinschi, Bogdan 7 2006 Deciding key cycles for security protocols. Zbl 1165.94319 Cortier, Véronique; Zălinescu, Eugen 6 2006 Relating two standard notions of secrecy. Zbl 1225.94020 Cortier, Véronique; Rusinowitch, Michaël; Zălinescu, Eugen 1 2006 A note on maximally repeated sub-patterns of a point set. Zbl 1097.68120 Cortier, Véronique; Goaoc, Xavier; Lee, Mira; Na, Hyeon-Suk 1 2006 Computationally sound implementations of equational theories against passive adversaries. Zbl 1084.94510 Baudet, Mathieu; Cortier, Véronique; Kremer, Steve 15 2005 Tree automata with one memory set constraints and cryptographic protocols. Zbl 1070.68066 Comon, Hubert; Cortier, Véronique 14 2005 Computationally sound, automated proofs for security protocols. Zbl 1108.68454 Cortier, Véronique; Warinschi, Bogdan 12 2005 Deciding knowledge in security protocols under equational theories. Zbl 1099.94026 Abadi, Martín; Cortier, Véronique 12 2004 Security properties: two agents are sufficient. Zbl 1073.68028 Comon-Lundh, Hubert; Cortier, Véronique 8 2004 New decidability results for fragments of first-order logic and application to cryptographic protocols. Zbl 1038.03012 Comon-Lundh, Hubert; Cortier, Véronique 15 2003 Security properties: Two agents are sufficient. Zbl 1032.94508 Comon-Lundh, Hubert; Cortier, Véronique 6 2003 About the decision of reachability for register machines. Zbl 1034.68057 Cortier, Véronique 4 2002 Tree automata with one memory, set constraints, and ping-pong protocols. Zbl 0986.68047 Comon, Hubert; Cortier, Véronique; Mitchell, John 10 2001 Flatness is not a weakness. Zbl 0973.68142 Comon, Hubert; Cortier, Vèronique 25 2000 Decidable fragments of simultaneous rigid reachability. Zbl 0943.68096 Cortier, Veronique; Ganzinger, Harald; Jacquemard, Florent; Veanes, Margus 2 1999 all cited Publications top 5 cited Publications all top 5 Cited by 256 Authors 25 Delaune, Stéphanie 18 Cortier, Véronique 10 Demri, Stéphane P. 10 Kremer, Steve 7 Meadows, Catherine A. 7 Rusinowitch, Michaël 6 Cheval, Vincent 6 Chevalier, Yannick 5 Backes, Michael 5 Comon-Lundh, Hubert 5 Küsters, Ralf 5 Mödersheim, Sebastian Alexander 4 Finkel, Alain 4 Jacquemard, Florent 4 Lakhnech, Yassine 4 Marshall, Andrew M. 4 Turuani, Mathieu 3 Arapinis, Myrto 3 Blanchet, Bruno 3 Caleiro, Carlos 3 Ciobâcă, Ştefan 3 Dang, Zhe 3 Goubault-Larrecq, Jean 3 Horne, Ross 3 Lafourcade, Pascal 3 Lugiez, Denis 3 Ryan, Mark Dermot 3 Sangnier, Arnaud 3 Talbot, Jean-Marc 3 Verma, Kumar Neeraj 3 Viganò, Luca 3 Warinschi, Bogdan 2 Abadi, Martín 2 Arnaud, Mathilde 2 Avanesov, Tigran 2 Ayala-Rincón, Mauricio 2 Bana, Gergei 2 Basin, David A. 2 Baudet, Mathieu 2 Bollig, Benedikt 2 Bonacina, Maria Paola 2 Bozzelli, Laura 2 Bursuc, Sergiu 2 Chadha, Rohit 2 Chambart, Pierre 2 Cremers, Cas J. F. 2 Duflot, Marie 2 Dürmuth, Markus 2 Ene, Cristian 2 Erbatur, Serdar 2 Filiot, Emmanuel 2 Gascon, Régis 2 Héam, Pierre-Cyrille 2 Herzog, Jonathan C. 2 Hirschi, Lucca 2 Klay, Francis 2 Kouchnarenko, Olga 2 Lazić, Ranko 2 Lin, Hai 2 Lozes, Etienne 2 Lynch, Christopher A. 2 Mauw, Sjouke 2 Mordido, Andreia 2 Narendran, Paliath 2 Ouaknine, Joel O. 2 Palamidessi, Catuscia 2 Pang, Jun 2 Pinchinat, Sophie 2 Quaas, Karin 2 Ravishankar, Veena 2 Ringeissen, Christophe 2 Rozek, Brandon 2 Ščedrov, Andrej 2 Schmitz, Sylvain 2 Stam, Martijn 2 Tison, Sophie 2 Tiu, Alwen Fernanto 2 Treinen, Ralf 2 Vacher, Camille 2 Veanes, Margus 2 Wilke, Thomas 2 Worrell, James Benjamin 2 Yurkov, Semen 1 Ábrego, Bernardo Manuel 1 Adão, Pedro 1 Affeldt, Reynald 1 Ahn, Taehyun 1 Almousa, Omar 1 Amadio, Roberto M. 1 Babel, Kushal 1 Baelde, David 1 Bardin, Sébastien 1 Bauer, Matthew Steven 1 Ben Rajeb, Narjes 1 Benerecetti, Massimo 1 Berrima, Mouhebeddine 1 Bersani, Marcello Maria 1 Boichut, Yohan 1 Boreale, Michele 1 Borgström, Johannes ...and 156 more Authors all top 5 Cited in 27 Serials 22 Theoretical Computer Science 20 Information and Computation 7 Journal of Automated Reasoning 3 Journal of Symbolic Computation 3 Journal of Applied Non-Classical Logics 3 The Journal of Logic and Algebraic Programming 2 Information Sciences 2 Formal Aspects of Computing 2 Mathematical Structures in Computer Science 2 Formal Methods in System Design 2 ACM Transactions on Computational Logic 2 Journal of Applied Logic 2 Logical Methods in Computer Science 2 Journal of Logical and Algebraic Methods in Programming 1 Acta Informatica 1 Information Processing Letters 1 Journal of Computer and System Sciences 1 Synthese 1 Annals of Pure and Applied Logic 1 Journal of Cryptology 1 International Journal of Foundations of Computer Science 1 Distributed Computing 1 The Electronic Journal of Combinatorics 1 RAIRO. Theoretical Informatics and Applications 1 Journal of Formalized Reasoning 1 RAIRO. Theoretical Informatics and Applications 1 TheoretiCS all top 5 Cited in 7 Fields 146 Computer science (68-XX) 93 Information and communication theory, circuits (94-XX) 41 Mathematical logic and foundations (03-XX) 4 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 1 Combinatorics (05-XX) 1 General algebraic systems (08-XX) 1 Convex and discrete geometry (52-XX) Citations by Year