×

Cortier, Véronique

Author ID: cortier.veronique Recent zbMATH articles by "Cortier, Véronique"
Published as: Cortier, Véronique; Cortier, Veronique; Cortier, Vèronique

Publications by Year

Citations contained in zbMATH Open

46 Publications have been cited 309 times in 171 Documents Cited by Year
Deciding knowledge in security protocols under equational theories. Zbl 1153.94339
Abadi, Martín; Cortier, Véronique
42
2006
Flatness is not a weakness. Zbl 0973.68142
Comon, Hubert; Cortier, Vèronique
25
2000
Computationally sound implementations of equational theories against passive adversaries. Zbl 1084.94510
Baudet, Mathieu; Cortier, Véronique; Kremer, Steve
15
2005
New decidability results for fragments of first-order logic and application to cryptographic protocols. Zbl 1038.03012
Comon-Lundh, Hubert; Cortier, Véronique
15
2003
Tree automata with one memory set constraints and cryptographic protocols. Zbl 1070.68066
Comon, Hubert; Cortier, Véronique
14
2005
Computationally sound, automated proofs for security protocols. Zbl 1108.68454
Cortier, Véronique; Warinschi, Bogdan
12
2005
Deciding knowledge in security protocols under equational theories. Zbl 1099.94026
Abadi, Martín; Cortier, Véronique
12
2004
A survey of symbolic methods in computational analysis of cryptographic systems. Zbl 1213.94093
Cortier, Véronique; Kremer, Steve; Warinschi, Bogdan
11
2011
Tree automata with one memory, set constraints, and ping-pong protocols. Zbl 0986.68047
Comon, Hubert; Cortier, Véronique; Mitchell, John
10
2001
YAPA: a generic tool for computing intruder knowledge. Zbl 1242.94018
Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie
10
2009
Safely composing security protocols. Zbl 1135.68392
Cortier, Véronique; Delaitre, Jérémie; Delaune, Stéphanie
8
2007
Security properties: two agents are sufficient. Zbl 1073.68028
Comon-Lundh, Hubert; Cortier, Véronique
8
2004
Deciding knowledge in security protocols for monoidal equational theories. Zbl 1137.68325
Cortier, Véronique; Delaune, Stéphanie
8
2007
Combining algorithms for deciding knowledge in security protocols. Zbl 1148.68361
Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie
8
2007
Deciding security properties for cryptographic protocols. application to key cycles. Zbl 1351.94035
Comon-Lundh, Hubert; Cortier, Véronique; Zălinescu, Eugen
8
2010
Deciding equivalence-based properties using constraint solving. Zbl 1294.68111
Cheval, Vincent; Cortier, Véronique; Delaune, Stéphanie
8
2013
Computationally sound symbolic secrecy in the presence of hash functions. Zbl 1177.94142
Cortier, Véronique; Kremer, Steve; Küsters, Ralf; Warinschi, Bogdan
7
2006
Safely composing security protocols. Zbl 1165.68358
Cortier, Véronique; Delaune, Stéphanie
7
2009
Security properties: Two agents are sufficient. Zbl 1032.94508
Comon-Lundh, Hubert; Cortier, Véronique
6
2003
Deciding key cycles for security protocols. Zbl 1165.94319
Cortier, Véronique; Zălinescu, Eugen
6
2006
Typing messages for free in security protocols: the case of equivalence properties. Zbl 1417.68124
Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie
6
2014
YAPA: a generic tool for computing intruder knowledge. Zbl 1353.68019
Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie
6
2013
Automatic analysis of the security of XOR-based key management schemes. Zbl 1186.68180
Cortier, Véronique; Keighren, Gavin; Steel, Graham
5
2007
About the decision of reachability for register machines. Zbl 1034.68057
Cortier, Véronique
4
2002
How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones. Zbl 1230.68141
Comon-Lundh, Hubert; Cortier, Véronique
4
2011
Decidability and combination results for two notions of knowledge in security protocols. Zbl 1242.68099
Cortier, Véronique; Delaune, Stéphanie
4
2012
From security protocols to pushdown automata. Zbl 1367.68186
Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie
4
2015
Belenios: a simple private and verifiable electronic voting system. Zbl 1533.94037
Cortier, Véronique; Gaudry, Pierrick; Glondu, Stéphane
4
2019
Computationally sound implementations of equational theories against passive adversaries. Zbl 1170.68016
Baudet, Mathieu; Cortier, Véronique; Kremer, Steve
3
2009
Analysing routing protocols: four nodes topologies are sufficient. Zbl 1353.68020
Cortier, Véronique; Degrieck, Jan; Delaune, Stéphanie
3
2012
Equivalence properties by typing in cryptographic branching protocols. Zbl 1427.68035
Cortier, Véronique; Grimm, Niklas; Lallemand, Joseph; Maffei, Matteo
3
2018
Decidable fragments of simultaneous rigid reachability. Zbl 0943.68096
Cortier, Veronique; Ganzinger, Harald; Jacquemard, Florent; Veanes, Margus
2
1999
Relating two standard notions of secrecy. Zbl 1125.68046
Cortier, Véronique; Rusinowitch, Michaël; Zălinescu, Eugen
2
2007
From security protocols to pushdown automata. Zbl 1335.94040
Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie
2
2013
Practical everlasting privacy. Zbl 1390.68273
Arapinis, Myrto; Cortier, Véronique; Kremer, Steve; Ryan, Mark
2
2013
Deciding security for protocols with recursive tests. Zbl 1341.68013
Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie
2
2011
Typing messages for free in security protocols. Zbl 1433.68211
Chrétien, Rémy; Cortier, Véronique; Dallon, Antoine; Delaune, Stéphanie
2
2020
When are three voters enough for privacy properties? Zbl 1499.68045
Arapinis, Myrto; Cortier, Véronique; Kremer, Steve
2
2016
Efficiently deciding equivalence for standard primitives and phases. Zbl 1496.68060
Cortier, Véronique; Dallon, Antoine; Delaune, Stéphanie
2
2018
Relating two standard notions of secrecy. Zbl 1225.94020
Cortier, Véronique; Rusinowitch, Michaël; Zălinescu, Eugen
1
2006
Explicit randomness is not necessary when modeling probabilistic encryption. Zbl 1277.94021
Cortier, Véronique; Hördegen, Heinrich; Warinschi, Bogdan
1
2007
Deciding knowledge in security protocols under some e-voting theories. Zbl 1223.68016
Berrima, Mouhebeddine; Ben Rajeb, Narjes; Cortier, Véronique
1
2011
Security proof with dishonest keys. Zbl 1353.68070
Comon-Lundh, Hubert; Cortier, Véronique; Scerri, Guillaume
1
2012
A note on maximally repeated sub-patterns of a point set. Zbl 1097.68120
Cortier, Véronique; Goaoc, Xavier; Lee, Mira; Na, Hyeon-Suk
1
2006
Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols. Zbl 1511.68042
Cortier, Véronique; Delaune, Stéphanie; Dreier, Jannik
1
2020
Checking trace equivalence: how to get rid of nonces? Zbl 1499.68048
Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie
1
2015
Typing messages for free in security protocols. Zbl 1433.68211
Chrétien, Rémy; Cortier, Véronique; Dallon, Antoine; Delaune, Stéphanie
2
2020
Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols. Zbl 1511.68042
Cortier, Véronique; Delaune, Stéphanie; Dreier, Jannik
1
2020
Belenios: a simple private and verifiable electronic voting system. Zbl 1533.94037
Cortier, Véronique; Gaudry, Pierrick; Glondu, Stéphane
4
2019
Equivalence properties by typing in cryptographic branching protocols. Zbl 1427.68035
Cortier, Véronique; Grimm, Niklas; Lallemand, Joseph; Maffei, Matteo
3
2018
Efficiently deciding equivalence for standard primitives and phases. Zbl 1496.68060
Cortier, Véronique; Dallon, Antoine; Delaune, Stéphanie
2
2018
When are three voters enough for privacy properties? Zbl 1499.68045
Arapinis, Myrto; Cortier, Véronique; Kremer, Steve
2
2016
From security protocols to pushdown automata. Zbl 1367.68186
Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie
4
2015
Checking trace equivalence: how to get rid of nonces? Zbl 1499.68048
Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie
1
2015
Typing messages for free in security protocols: the case of equivalence properties. Zbl 1417.68124
Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie
6
2014
Deciding equivalence-based properties using constraint solving. Zbl 1294.68111
Cheval, Vincent; Cortier, Véronique; Delaune, Stéphanie
8
2013
YAPA: a generic tool for computing intruder knowledge. Zbl 1353.68019
Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie
6
2013
From security protocols to pushdown automata. Zbl 1335.94040
Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie
2
2013
Practical everlasting privacy. Zbl 1390.68273
Arapinis, Myrto; Cortier, Véronique; Kremer, Steve; Ryan, Mark
2
2013
Decidability and combination results for two notions of knowledge in security protocols. Zbl 1242.68099
Cortier, Véronique; Delaune, Stéphanie
4
2012
Analysing routing protocols: four nodes topologies are sufficient. Zbl 1353.68020
Cortier, Véronique; Degrieck, Jan; Delaune, Stéphanie
3
2012
Security proof with dishonest keys. Zbl 1353.68070
Comon-Lundh, Hubert; Cortier, Véronique; Scerri, Guillaume
1
2012
A survey of symbolic methods in computational analysis of cryptographic systems. Zbl 1213.94093
Cortier, Véronique; Kremer, Steve; Warinschi, Bogdan
11
2011
How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones. Zbl 1230.68141
Comon-Lundh, Hubert; Cortier, Véronique
4
2011
Deciding security for protocols with recursive tests. Zbl 1341.68013
Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie
2
2011
Deciding knowledge in security protocols under some e-voting theories. Zbl 1223.68016
Berrima, Mouhebeddine; Ben Rajeb, Narjes; Cortier, Véronique
1
2011
Deciding security properties for cryptographic protocols. application to key cycles. Zbl 1351.94035
Comon-Lundh, Hubert; Cortier, Véronique; Zălinescu, Eugen
8
2010
YAPA: a generic tool for computing intruder knowledge. Zbl 1242.94018
Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie
10
2009
Safely composing security protocols. Zbl 1165.68358
Cortier, Véronique; Delaune, Stéphanie
7
2009
Computationally sound implementations of equational theories against passive adversaries. Zbl 1170.68016
Baudet, Mathieu; Cortier, Véronique; Kremer, Steve
3
2009
Safely composing security protocols. Zbl 1135.68392
Cortier, Véronique; Delaitre, Jérémie; Delaune, Stéphanie
8
2007
Deciding knowledge in security protocols for monoidal equational theories. Zbl 1137.68325
Cortier, Véronique; Delaune, Stéphanie
8
2007
Combining algorithms for deciding knowledge in security protocols. Zbl 1148.68361
Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie
8
2007
Automatic analysis of the security of XOR-based key management schemes. Zbl 1186.68180
Cortier, Véronique; Keighren, Gavin; Steel, Graham
5
2007
Relating two standard notions of secrecy. Zbl 1125.68046
Cortier, Véronique; Rusinowitch, Michaël; Zălinescu, Eugen
2
2007
Explicit randomness is not necessary when modeling probabilistic encryption. Zbl 1277.94021
Cortier, Véronique; Hördegen, Heinrich; Warinschi, Bogdan
1
2007
Deciding knowledge in security protocols under equational theories. Zbl 1153.94339
Abadi, Martín; Cortier, Véronique
42
2006
Computationally sound symbolic secrecy in the presence of hash functions. Zbl 1177.94142
Cortier, Véronique; Kremer, Steve; Küsters, Ralf; Warinschi, Bogdan
7
2006
Deciding key cycles for security protocols. Zbl 1165.94319
Cortier, Véronique; Zălinescu, Eugen
6
2006
Relating two standard notions of secrecy. Zbl 1225.94020
Cortier, Véronique; Rusinowitch, Michaël; Zălinescu, Eugen
1
2006
A note on maximally repeated sub-patterns of a point set. Zbl 1097.68120
Cortier, Véronique; Goaoc, Xavier; Lee, Mira; Na, Hyeon-Suk
1
2006
Computationally sound implementations of equational theories against passive adversaries. Zbl 1084.94510
Baudet, Mathieu; Cortier, Véronique; Kremer, Steve
15
2005
Tree automata with one memory set constraints and cryptographic protocols. Zbl 1070.68066
Comon, Hubert; Cortier, Véronique
14
2005
Computationally sound, automated proofs for security protocols. Zbl 1108.68454
Cortier, Véronique; Warinschi, Bogdan
12
2005
Deciding knowledge in security protocols under equational theories. Zbl 1099.94026
Abadi, Martín; Cortier, Véronique
12
2004
Security properties: two agents are sufficient. Zbl 1073.68028
Comon-Lundh, Hubert; Cortier, Véronique
8
2004
New decidability results for fragments of first-order logic and application to cryptographic protocols. Zbl 1038.03012
Comon-Lundh, Hubert; Cortier, Véronique
15
2003
Security properties: Two agents are sufficient. Zbl 1032.94508
Comon-Lundh, Hubert; Cortier, Véronique
6
2003
About the decision of reachability for register machines. Zbl 1034.68057
Cortier, Véronique
4
2002
Tree automata with one memory, set constraints, and ping-pong protocols. Zbl 0986.68047
Comon, Hubert; Cortier, Véronique; Mitchell, John
10
2001
Flatness is not a weakness. Zbl 0973.68142
Comon, Hubert; Cortier, Vèronique
25
2000
Decidable fragments of simultaneous rigid reachability. Zbl 0943.68096
Cortier, Veronique; Ganzinger, Harald; Jacquemard, Florent; Veanes, Margus
2
1999
all top 5

Cited by 256 Authors

25 Delaune, Stéphanie
18 Cortier, Véronique
10 Demri, Stéphane P.
10 Kremer, Steve
7 Meadows, Catherine A.
7 Rusinowitch, Michaël
6 Cheval, Vincent
6 Chevalier, Yannick
5 Backes, Michael
5 Comon-Lundh, Hubert
5 Küsters, Ralf
5 Mödersheim, Sebastian Alexander
4 Finkel, Alain
4 Jacquemard, Florent
4 Lakhnech, Yassine
4 Marshall, Andrew M.
4 Turuani, Mathieu
3 Arapinis, Myrto
3 Blanchet, Bruno
3 Caleiro, Carlos
3 Ciobâcă, Ştefan
3 Dang, Zhe
3 Goubault-Larrecq, Jean
3 Horne, Ross
3 Lafourcade, Pascal
3 Lugiez, Denis
3 Ryan, Mark Dermot
3 Sangnier, Arnaud
3 Talbot, Jean-Marc
3 Verma, Kumar Neeraj
3 Viganò, Luca
3 Warinschi, Bogdan
2 Abadi, Martín
2 Arnaud, Mathilde
2 Avanesov, Tigran
2 Ayala-Rincón, Mauricio
2 Bana, Gergei
2 Basin, David A.
2 Baudet, Mathieu
2 Bollig, Benedikt
2 Bonacina, Maria Paola
2 Bozzelli, Laura
2 Bursuc, Sergiu
2 Chadha, Rohit
2 Chambart, Pierre
2 Cremers, Cas J. F.
2 Duflot, Marie
2 Dürmuth, Markus
2 Ene, Cristian
2 Erbatur, Serdar
2 Filiot, Emmanuel
2 Gascon, Régis
2 Héam, Pierre-Cyrille
2 Herzog, Jonathan C.
2 Hirschi, Lucca
2 Klay, Francis
2 Kouchnarenko, Olga
2 Lazić, Ranko
2 Lin, Hai
2 Lozes, Etienne
2 Lynch, Christopher A.
2 Mauw, Sjouke
2 Mordido, Andreia
2 Narendran, Paliath
2 Ouaknine, Joel O.
2 Palamidessi, Catuscia
2 Pang, Jun
2 Pinchinat, Sophie
2 Quaas, Karin
2 Ravishankar, Veena
2 Ringeissen, Christophe
2 Rozek, Brandon
2 Ščedrov, Andrej
2 Schmitz, Sylvain
2 Stam, Martijn
2 Tison, Sophie
2 Tiu, Alwen Fernanto
2 Treinen, Ralf
2 Vacher, Camille
2 Veanes, Margus
2 Wilke, Thomas
2 Worrell, James Benjamin
2 Yurkov, Semen
1 Ábrego, Bernardo Manuel
1 Adão, Pedro
1 Affeldt, Reynald
1 Ahn, Taehyun
1 Almousa, Omar
1 Amadio, Roberto M.
1 Babel, Kushal
1 Baelde, David
1 Bardin, Sébastien
1 Bauer, Matthew Steven
1 Ben Rajeb, Narjes
1 Benerecetti, Massimo
1 Berrima, Mouhebeddine
1 Bersani, Marcello Maria
1 Boichut, Yohan
1 Boreale, Michele
1 Borgström, Johannes
...and 156 more Authors

Citations by Year