Stéphanie Delaune's Publications
Chapters in Books
- Hubert Comon-Lundh and Stéphanie Delaune. La preuve de protocoles cryptographiques. In Gildas Avoine and Marc-Olivier Killijian, editors, 13 défis de la cybersécurité, pp. 175–189, CNRS éditions, June 2020.
Details
BibTeX
Download:
(unavailable)
- Hubert Comon-Lundh and Stéphanie Delaune. Formal Security Proofs. In Tobias Nipkow, Orna Grumberg, and Benedikt Hauptmann, editors, Software Safety and Security, NATO Science for Peace and Security Series -- D: Information and Communication Security, pp. 26–63, IOS Press, May 2012.
Details
BibTeX
Download:
[pdf]
- Hubert Comon-Lundh, Stéphanie Delaune, and Jonathan K. Millen. Constraint solving techniques and enriching the model with equational theories. In Véronique Cortier and Steve Kremer, editors, Formal Models and Techniques for Analyzing Security Protocols, Cryptology and Information Security Series, pp. 35–61, IOS Press, 2011.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. In David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Mirosław Kutyłowski, and Ben Adida, editors, Towards Trustworthy Elections -- New Directions in Electronic Voting, Lecture Notes in Computer Science, pp. 289–309, Springer, May 2010.
Details
BibTeX
Download:
[pdf]
Journals
- Véronique Cortier, Stéphanie Delaune, Jannik Dreier, and Elise Klein. Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols. Journal of Computer Security (JCS), 30(4):573–598, 2022.
Details
BibTeX
Download:
[pdf]
- Alexandre Debant, Stéphanie Delaune, and Cyrille Wiedling. So Near and Yet So Far - Symbolic Verification of Distance-Bounding Protocols. ACM Transactions on Privacy and Security (ToPS), 25(2):11:1–11:39, 2022.
Details
BibTeX
Download:
[pdf] [ps.gz] [ps] [DOI]
- Véronique Cortier, Stéphanie Delaune, and Vaishnavi Sundararajan. A Decidable Class of Security Protocols for Both Reachability and Equivalence Properties. J. Autom. Reason., 65(4):479–520, 2021.
Details
BibTeX
Download:
[pdf]
- Rémy Chrétien, Véronique Cortier, Antoine Dallon, and Stéphanie Delaune. Typing messages for free in security protocols. ACM Transactions on Computational Logic (TOCL), 21(1):1:1–1:52, 2020.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Patrick Derbez, and Mathieu Vavrille. Catching the Fastest Boomerangs Application to SKINNY. IACR Trans. Symmetric Cryptol., 2020(4):104–129, 2020.
Details
BibTeX
Download:
[pdf]
- Lucca Hirschi, David Baelde, and Stéphanie Delaune. A method for unbounded verification of privacy-type properties. Journal of Computer Security, 27(3):277–342, 2019.
Details
BibTeX
Download:
[pdf]
- David Baelde, Stéphanie Delaune, and Lucca Hirschi. A reduced semantics for deciding trace equivalence. Logical Methods in Computer Science, 13(2), 2017.
Details
BibTeX
Download:
[pdf]
- Vincent Cheval, Hubert Comon-Lundh, and Stéphanie Delaune. A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation, 255:94–125, 2017.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune and Lucca Hirschi. A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols. Journal of Logical and Algebraic Methods in Programming, 87:127–144, 2017.
Details
BibTeX
Download:
[pdf]
- Rémy Chrétien, Véronique Cortier, and Stéphanie Delaune. From security protocols to pushdown automata. ACM Transactions on Computational Logic, 17(1:3), ACM Press, September 2015.
Details
BibTeX
Download:
[pdf]
- Myrto Arapinis, Stéphanie Delaune, and Steve Kremer. Dynamic Tags for Security Protocols. Logical Methods in Computer Science, 10(2:11), June 2014.
Details
BibTeX
Download:
[pdf]
- Mathilde Arnaud, Véronique Cortier, and Stéphanie Delaune. Modeling and Verifying Ad Hoc Routing Protocols. Information and Computation, 238:30–67, Elsevier Science Publishers, November 2014.
Details
BibTeX
Download:
[pdf]
- Sergiu Bursuc, Hubert Comon-Lundh, and Stéphanie Delaune. Deducibility constraints and blind signatures. Information and Computation, 238:106–127, Elsevier Science Publishers, November 2014.
Details
BibTeX
Download:
[pdf]
- Mathieu Baudet, Véronique Cortier, and Stéphanie Delaune. YAPA: A generic tool for computing intruder knowledge. ACM Transactions on Computational Logic, 14(1:4), ACM Press, February 2013.
Details
BibTeX
Download:
[pdf]
- Vincent Cheval, Véronique Cortier, and Stéphanie Delaune. Deciding equivalence-based properties using constraint solving. Theoretical Computer Science, 492:1–39, Elsevier Science Publishers, June 2013.
Details
BibTeX
Download:
[pdf]
- Céline Chevalier, Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Composition of Password-based Protocols. Formal Methods in System Design, 43(3):369–413, Springer, December 2013.
Details
BibTeX
Download:
[pdf]
- Stefan Ciobaca, Stéphanie Delaune, and Steve Kremer. Computing knowledge in security protocols under convergent equational theories. Journal of Automated Reasoning, 48(2):219–262, Springer, February 2012.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier and Stéphanie Delaune. Decidability and combination results for two notions of knowledge in security protocols. Journal of Automated Reasoning, 48(4):441–487, Springer, April 2012.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, and Graham Steel. Formal Analysis of PKCS#11 and Proprietary Extensions. Journal of Computer Security, 18(6):1211–1245, IOS Press, November 2010.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Symbolic bisimulation for the applied pi calculus. Journal of Computer Security, 18(2):317–377, IOS Press, March 2010.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier and Stéphanie Delaune. Safely Composing Security Protocols. Formal Methods in System Design, 34(1):1–36, Springer, February 2009.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Verifying Privacy-type Properties of Electronic Voting Protocols. Journal of Computer Security, 17(4):435–487, IOS Press, July 2009.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez, and Ralf Treinen. Symbolic protocol analysis for monoidal equational theories. Information and Computation, 206(2-4):312–351, Elsevier Science Publishers, February 2008.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier, Stéphanie Delaune, and Pascal Lafourcade. A Survey of Algebraic Properties Used in Cryptographic Protocols. Journal of Computer Security, 14(1):1–43, IOS Press, 2006.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune. An Undecidability Result for AGh. Theoretical Computer Science, 368(1-2):161–167, Elsevier Science Publishers, December 2006.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune and Florent Jacquemard. Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. Journal of Automated Reasoning, 36(1-2):85–124, Springer, January 2006.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune. Easy Intruder Deduction Problems with Homomorphisms. Information Processing Letters, 97(6):213–218, Elsevier Science Publishers, March 2006.
Details
BibTeX
Download:
[pdf]
Scientific Popularization
- David Baelde, Stéphanie Delaune, Charlie Jacomme, Adrien Koutsos, and Joseph Lallemand. The Squirrel Prover and its Logic. ACM SIGLOG News, 11(2):62–83, 2024.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier and Stéphanie Delaune. Entre transparence et confidentialité, les défis du vote électronique. Journal du CNRS, april 2021.
Details
BibTeX
Download:
[DOI]
- Stéphanie Delaune and Steve Kremer. Comment s'assurer qu'un protocole cryptographique n'a pas de faille ? Une histoire de logique !. Blog Binaire, Le Monde, February 2020.
Details
BibTeX
Download:
[DOI]
- Stéphanie Delaune. POPSTAR -- So near and yet so far. SigLog Newsletter, ACM Special Interest Group on Logic and Computation, 2018.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune. Protection des donnés: le chiffrement ne suffit pas. Journal du CNRS, December 2016.
Details
BibTeX
Download:
[DOI]
- Rémy Chrétien and Stéphanie Delaune. Le bitcoin, une monnaie 100% numérique. Blog Binaire, Le Monde, April 2014.
Details
BibTeX
Download:
[DOI]
- Rémy Chrétien and Stéphanie Delaune. Le bitcoin, une monnaie 100% numérique. Interstices, September 2014.
Details
BibTeX
Download:
[pdf]
- Rémy Chrétien and Stéphanie Delaune. La protection des informations sensibles. Pour La Science, 433:70–77, Belin, November 2013.
Details
BibTeX
Download:
[DOI]
- Stéphanie Delaune. Le vote électronique. La Recherche Magazine, September 2010.
Details
BibTeX
Download:
(unavailable)
Conferences
- Stéphanie Delaune, Joseph Lallemand, Gwendal Patat, Florian Roudot, and Mohamed Sabt. Formal Security Analysis of Widevine through the W3C EME Standard. In Proceedings of the 33rd USENIX Security Symposium, (USENIX'24), USENIX Association, Philadelphia, PA, USA, 2024.
Details
BibTeX
Download:
[pdf]
- David Baelde, Alexandre Debant, and Stéphanie Delaune. Proving Unlinkability using Proverif through Desynchronised Bi-Processes. In Proceedings of the 36th IEEE Computer Security Foundations Symposium (CSF'23), IEEE Computer Society Press, Dubrovnik, Croatia, July 2023.
Details
BibTeX
Download:
[pdf]
- Tristan Claverie, Gildas Avoine, Stéphanie Delaune, and José Lopes-Esteves. Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks. In Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS'23) - Part III, pp. 100–119, Lecture Notes in Computer Science 14346, Springer, The Hague, The Netherlands, 2023.
Details
BibTeX
Download:
[pdf]
- David Baelde, Stéphanie Delaune, Adrien Koutsos, and Solène Moreau. Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the SQUIRREL Proof Assistant. In Proceedings of the 35th IEEE Computer Security Foundations Symposium (CSF'22), pp. 289–304, IEEE Computer Society Press, Haifa, Israel, August 2022.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier, Antoine Dallon, and Stéphanie Delaune. A small bound on the number of sessions for security protocols. In Proceedings of the 35th IEEE Computer Security Foundations Symposium (CSF'22), pp. 33–48, IEEE Computer Society Press, Haifa, Israel, August 2022.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune and Joseph Lallemand. One vote is enough for analysing privacy. In Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS'22), pp. 173–194, Lecture Notes in Computer Science, Springer, Copenhague, Denmark, 2022.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Patrick Derbez, Arthur Gontier, and Charles Prud'homme. New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks. In Proceeding of the 23rd International Conference on Cryptology in India (INDOCRYPT'22), pp. 103–124, Lecture Notes in Computer Science 13774, Springer, Kolkata, India, 2022.
Details
BibTeX
Download:
[pdf]
- David Baelde, Stéphanie Delaune, Charlie Jacomme, Adrien Koutsos, and Solène Moreau. An Interactive Prover for Protocol Verification in the Computational Model. In Proceedings of the 42nd IEEE Symposium on Security and Privacy (S&P'21), IEEE Computer Society Press, San Francisco, California, USA, May 2021.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Patrick Derbez, Arthur Gontier, and Charles Prud'homme. A Simpler Model for Recovering Superpoly on Trivium. In Proceedings of the 28th International Conference on Selected Areas in Cryptography (SAC'21), Lecture Notes in Computer Science, Springer, 2021.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard, and Charles Prud'homme. Efficient Methods to Search for Best Differential Characteristics on SKINNY. In Proceedings of the 19th International Conference on Applied Cryptography and NetworkSecurity (ACNS'21), 2021.
Details
BibTeX
Download:
[pdf]
- David Baelde, Stéphanie Delaune, and Solène Moreau. A Method for Proving Unlinkability of Stateful Protocols. In Proceedings of the 33rd IEEE Computer Security Foundations Symposium (CSF'20), pp. 169–183, IEEE Computer Society Press, Virtual conference, June 2020.
Details
BibTeX
Download:
[pdf]
- Ioana Boureanu, Tom Chothia, Alexandre Debant, and Stéphanie Delaune. Security Analysis and Implementation of Relay-Resistant Contactless Payments. In Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS'20), ACM Press, Virtual conference, November 2020.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier, Stéphanie Delaune, and Jannik Dreier. Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols. In Proceedings of the 25th European Symposium on Research in Computer Security (ESORICS'20), Lecture Notes in Computer Science, Springer, Virtual conference, 2020.
Details
BibTeX
Download:
[pdf]
- Alexandre Debant, Stéphanie Delaune, and Cyrille Wiedling. Symbolic analysis of terrorist fraud resistance. In Proceedings of the 24th European Symposium on Research in Computer Security (ESORICS'19), Lecture Notes in Computer Science, Springer, Luxembourg, 2019.
Details
BibTeX
Download:
[pdf]
- Alexandre Debant and Stéphanie Delaune. Symbolic Verification of Distance Bounding Protocols. In Proceedings of the 8th International Conference on Principles of Security and Trust (POST'19), Lecture Notes in Computer Science, Springer, Prague, Czech Republic, 2019.
Details
BibTeX
Download:
[pdf]
- David Baelde, Stéphanie Delaune, and Lucca Hirschi. POR for Security Protocol Equivalences -- Beyond Action-Determinism. In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS'18), Lecture Notes in Computer Science, Springer, Barcelona, Spain, 2018.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier, Antoine Dallon, and Stéphanie Delaune. Efficiently deciding equivalence for standard primitives and phases. In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS'18), Lecture Notes in Computer Science, Springer, Barcelona, Spain, 2018.
Details
BibTeX
Download:
[pdf]
- Alexandre Debant, Stéphanie Delaune, and Cyrille Wiedling. A Symbolic Framework to Analyse Physical Proximity in Security Protocols. In 38th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FST&TCS'18), LIPIcs, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2018.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune. Analysing Privacy-Type Properties in Cryptographic Protocols (Invited Talk). In 3rd International Conference on Formal Structures for Computation and Deduction, (FSCD'18), LIPIcs 108, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Oxford, UK, 2018.
Details
BibTeX
Download:
[pdf]
- David Baelde, Stéphanie Delaune, Ivan Gazeau, and Steve Kremer. Symbolic verification of privacy-type properties for security protocols with XOR. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), IEEE Computer Society Press, Santa Barbara, CA, USA, August 2017.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier, Antoine Dallon, and Stéphanie Delaune. SAT-Equiv: an efficient tool for equivalence properties. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), IEEE Computer Society Press, Santa Barbara, CA, USA, August 2017.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, and Ludovic Robin. Formal verification of protocols based on short authenticated strings. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), IEEE Computer Society Press, Santa Barbara, CA, USA, August 2017.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier, Antoine Dallon, and Stéphanie Delaune. Bounding the number of agents, for equivalence too. In Proceedings of the 5th International Conference on Principles of Security and Trust (POST'16), pp. 211–232, Lecture Notes in Computer Science 9635, Springer, Eindhoven, The Netherlands, April 2016.
Details
BibTeX
Download:
[pdf]
- Lucca Hirschi, David Baelde, and Stéphanie Delaune. A method for verifying privacy-type properties: the unbounded case. In Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P'16), IEEE Computer Society Press, San Jose, California, USA, May 2016.
Details
BibTeX
Download:
[pdf]
- Myrto Arapinis, Vincent Cheval, and Stéphanie Delaune. Composing security protocols: from confidentiality to privacy. In Proceedings of the 4th International Conference on Principles of Security and Trust (POST'15), pp. 324–343, Lecture Notes in Computer Science 9036, Springer, London, UK, April 2015.
Details
BibTeX
Download:
[pdf]
- David Baelde, Stéphanie Delaune, and Lucca Hirschi. Partial Order Reduction for Security Protocols. In Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15), pp. 497–510, Leibniz International Proceedings in Informatics 42, Leibniz-Zentrum für Informatik, Madrid, Spain, September 2015.
Details
BibTeX
Download:
[pdf]
- Rémy Chrétien, Véronique Cortier, and Stéphanie Delaune. Checking trace equivalence: How to get rid of nonces?. In Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15), pp. 230–251, Lecture Notes in Computer Science, Springer, Vienna, Austria, September 2015.
Details
BibTeX
Download:
[pdf]
- Rémy Chrétien, Véronique Cortier, and Stéphanie Delaune. Decidability of trace equivalence for protocols with nonces. In Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF'15), pp. 170–184, IEEE Computer Society Press, Verona, Italy, July 2015.
Details
BibTeX
Download:
[pdf]
- David Baelde, Stéphanie Delaune, and Lucca Hirschi. A reduced semantics for deciding trace equivalence using constraint systems. In Proceedings of the 3rd International Conference on Principles of Security and Trust (POST'14), pp. 1–21, Lecture Notes in Computer Science 8414, Springer, Grenoble, France, April 2014.
Details
BibTeX
Download:
[pdf]
- Vincent Cheval, Stéphanie Delaune, and Mark D. Ryan. Tests for establishing security properties. In Revised Selected Papers of the 9th Symposium on Trustworthy Global Computing (TGC'14), pp. 82–96, Lecture Notes in Computer Science 8902, Springer, Rome, Italy, December 2014.
Details
BibTeX
Download:
[pdf]
- Rémy Chrétien, Véronique Cortier, and Stéphanie Delaune. Typing messages for free in security protocols: the case of equivalence properties. In Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), pp. 372–386, Lecture Notes in Computer Science 8704, Springer, Rome, Italy, September 2014.
Details
BibTeX
Download:
[pdf]
- Rémy Chrétien and Stéphanie Delaune. Formal analysis of privacy for routing protocols in mobile ad hoc networks. In Proceedings of the 2nd International Conference on Principles of Security and Trust (POST'13), pp. 1–20, Lecture Notes in Computer Science 7796, Springer, Rome, Italy, March 2013.
Details
BibTeX
Download:
[pdf]
- Rémy Chrétien, Véronique Cortier, and Stéphanie Delaune. From security protocols to pushdown automata. In Proceedings of the 40th International Colloquium on Automata, Languages and Programming (ICALP'13) -- Part II, pp. 137–149, Lecture Notes in Computer Science 7966, Springer, Riga, Latvia, July 2013.
Details
BibTeX
Download:
[pdf]
- Myrto Arapinis, Vincent Cheval, and Stéphanie Delaune. Verifying privacy-type properties in a modular way. In Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF'12), pp. 95–109, IEEE Computer Society Press, Cambridge Massachusetts, USA, June 2012.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier, Jan Degrieck, and Stéphanie Delaune. Analysing routing protocols: four nodes topologies are sufficient. In Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), pp. 30–50, Lecture Notes in Computer Science 7215, Springer, Tallinn, Estonia, March 2012.
Details
BibTeX
Download:
[pdf]
- Morten Dahl, Stéphanie Delaune, and Graham Steel. Formal Analysis of Privacy for Anonymous Location Based Services. In Revised Selected Papers of the Workshop on Theory of Security and Applications (TOSCA'11), pp. 98–112, Lecture Notes in Computer Science 6993, Springer, Saarbrücken, Germany, January 2012.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, and Daniel Pasail\ua. Security protocols, constraint systems, and group theories. In Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12), pp. 164–178, Lecture Notes in Artificial Intelligence 7364, Springer-Verlag, Manchester, UK, June 2012.
Details
BibTeX
Download:
[pdf]
- Mathilde Arnaud, Véronique Cortier, and Stéphanie Delaune. Deciding security for protocols with recursive tests. In Proceedings of the 23rd International Conference on Automated Deduction (CADE'11), pp. 49–63, Lecture Notes in Artificial Intelligence, Springer, Wrocław, Poland, July 2011.
Details
BibTeX
Download:
[pdf]
- Vincent Cheval, Hubert Comon-Lundh, and Stéphanie Delaune. Trace Equivalence Decision: Negative Tests and Non-determinism. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11), pp. 321–330, ACM Press, Chicago, Illinois, USA, October 2011.
Details
BibTeX
Download:
[pdf]
- Céline Chevalier, Stéphanie Delaune, and Steve Kremer. Transforming Password Protocols to Compose. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), pp. 204–216, Leibniz International Proceedings in Informatics 13, Leibniz-Zentrum für Informatik, Mumbai, India, December 2011.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, Mark D. Ryan, and Graham Steel. Formal analysis of protocols based on TPM state registers. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11), pp. 66–82, IEEE Computer Society Press, Cernay-la-Ville, France, June 2011.
Details
BibTeX
Download:
[pdf]
- Mathilde Arnaud, Véronique Cortier, and Stéphanie Delaune. Modeling and Verifying Ad Hoc Routing Protocols. In Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF'10), pp. 59–74, IEEE Computer Society Press, Edinburgh, Scotland, UK, July 2010.
Details
BibTeX
Download:
[pdf]
- Vincent Cheval, Hubert Comon-Lundh, and Stéphanie Delaune. Automating security analysis: symbolic equivalence of constraint systems. In Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR'10), pp. 412–426, Lecture Notes in Artificial Intelligence 6173, Springer-Verlag, Edinburgh, Scotland, UK, July 2010.
Details
BibTeX
Download:
[pdf]
- Morten Dahl, Stéphanie Delaune, and Graham Steel. Formal Analysis of Privacy for Vehicular Mix-Zones. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS'10), pp. 55–70, Lecture Notes in Computer Science 6345, Springer, Athens, Greece, September 2010.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, Mark D. Ryan, and Graham Steel. A Formal Analysis of Authentication in the TPM. In Revised Selected Papers of the 7th International Workshop on Formal Aspects in Security and Trust (FAST'10), pp. 111–125, Lecture Notes in Computer Science 6561, Springer, Pisa, Italy, September 2010.
Details
BibTeX
Download:
[pdf]
- Mathieu Baudet, Véronique Cortier, and Stéphanie Delaune. YAPA: A generic tool for computing intruder knowledge. In Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA'09), pp. 148–163, Lecture Notes in Computer Science 5595, Springer, Brasília, Brazil, June 2009.
Details
BibTeX
Download:
[pdf]
- Sergiu Bursuc, Stéphanie Delaune, and Hubert Comon-Lundh. Deducibility constraints. In Proceedings of the 13th Asian Computing Science Conference (ASIAN'09), pp. 24–38, Lecture Notes in Computer Science 5913, Springer, Seoul, Korea, December 2009.
Details
BibTeX
Download:
[pdf]
- Rohit Chadha, Stéphanie Delaune, and Steve Kremer. Epistemic Logic for the Applied Pi Calculus. In Proceedings of IFIP International Conference on Formal Techniques for Distributed Systems (FMOODS/FORTE'09), pp. 182–197, Lecture Notes in Computer Science 5522, Springer, Lisbon, Portugal, June 2009.
Details
BibTeX
Download:
[pdf]
- Stefan Ciobaca, Stéphanie Delaune, and Steve Kremer. Computing knowledge in security protocols under convergent equational theories. In Proceedings of the 22nd International Conference on Automated Deduction (CADE'09), pp. 355–370, Lecture Notes in Artificial Intelligence, Springer, Montreal, Canada, August 2009.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier and Stéphanie Delaune. A method for proving observational equivalence. In Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09), pp. 266–276, IEEE Computer Society Press, Port Jefferson, New York, USA, July 2009.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, and Olivier Pereira. Simulation based security in the applied pi calculus. In Proceedings of the 29th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'09), pp. 169–180, Leibniz International Proceedings in Informatics 4, Leibniz-Zentrum für Informatik, Kanpur, India, December 2009.
Details
BibTeX
Download:
[pdf]
- Myrto Arapinis, Stéphanie Delaune, and Steve Kremer. From One Session to Many: Dynamic Tags for Security Protocols. In Proceedings of the 15th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'08), pp. 128–142, Lecture Notes in Artificial Intelligence 5330, Springer, Doha, Qatar, November 2008.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Composition of Password-based Protocols. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pp. 239–251, IEEE Computer Society Press, Pittsburgh, Pennsylvania, USA, June 2008.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, and Graham Steel. Formal Analysis of PKCS#11. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pp. 331–344, IEEE Computer Society Press, Pittsburgh, Pennsylvania, USA, June 2008.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Mark D. Ryan, and Ben Smyth. Automatic verification of privacy properties in the applied pi-calculus. In Proceedings of the 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM'08), pp. 263–278, IFIP Conference Proceedings 263, Springer, Trondheim, Norway, June 2008.
Details
BibTeX
Download:
[pdf]
- Mathilde Arnaud, Véronique Cortier, and Stéphanie Delaune. Combining algorithms for deciding knowledge in security protocols. In Proceedings of the 6th International Symposium on Frontiers of Combining Systems (FroCoS'07), pp. 103–117, Lecture Notes in Artificial Intelligence 4720, Springer, Liverpool, UK, September 2007.
Details
BibTeX
Download:
[pdf]
- Sergiu Bursuc, Hubert Comon-Lundh, and Stéphanie Delaune. Deducibility Constraints, Equational Theory and Electronic Money. In Rewriting, Computation and Proof --- Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of his 60th Birthday, pp. 196–212, Lecture Notes in Computer Science 4600, Springer, Cachan, France, June 2007.
Details
BibTeX
Download:
[pdf]
- Sergiu Bursuc, Hubert Comon-Lundh, and Stéphanie Delaune. Associative-Commutative Deducibility Constraints. In Proceedings of the 24th Annual Symposium on Theoretical Aspects of Computer Science (STACS'07), pp. 634–645, Lecture Notes in Computer Science 4393, Springer, Aachen, Germany, February 2007.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier, Jérémie Delaitre, and Stéphanie Delaune. Safely Composing Security Protocols. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), pp. 352–363, Lecture Notes in Computer Science 4855, Springer, New Delhi, India, December 2007.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier and Stéphanie Delaune. Deciding Knowledge in Security Protocols for Monoidal Equational Theories. In Proceedings of the 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'07), pp. 196–210, Lecture Notes in Artificial Intelligence 4790, Springer, Yerevan, Armenia, October 2007.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier, Stéphanie Delaune, and Graham Steel. A Formal Theory of Key Conjuring. In Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF'07), pp. 79–93, IEEE Computer Society Press, Venice, Italy, July 2007.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Symbolic Bisimulation for the Applied Pi-Calculus. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), pp. 133–145, Lecture Notes in Computer Science 4855, Springer, New Delhi, India, December 2007.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Hai Lin, and \relax Christopher Lynch. Protocol verification via rigid\slashflexible resolution. In Proceedings of the 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'07), pp. 242–256, Lecture Notes in Artificial Intelligence 4790, Springer, Yerevan, Armenia, October 2007.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Coercion-Resistance and Receipt-Freeness in Electronic Voting. In Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp. 28–39, IEEE Computer Society Press, Venice, Italy, July 2006.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez, and Ralf Treinen. Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06) --- Part II, pp. 132–143, Lecture Notes in Computer Science 4052, Springer, Venice, Italy, July 2006.
Details
BibTeX
Download:
[pdf]
- Hubert Comon-Lundh and Stéphanie Delaune. The finite variant property: How to get rid of some algebraic properties. In Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), pp. 294–307, Lecture Notes in Computer Science 3467, Springer, Nara, Japan, April 2005.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune and Florent Jacquemard. A Decision Procedure for the Verification of Security Protocols with Explicit Destructors. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04), pp. 278–287, ACM Press, Washington, D.C., USA, October 2004.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune and Florent Jacquemard. A Theory of Dictionary Attacks and its Complexity. In Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW'04), pp. 2–15, IEEE Computer Society Press, Asilomar, Pacific Grove, California, USA, June 2004.
Details
BibTeX
Download:
[pdf]
Theses
- Stéphanie Delaune. Verification of security protocols: from confidentiality to privacy. Ph.D. Thesis, École Normale Supérieure de Cachan, France, 2011.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune. Vérification des protocoles cryptographiques et propriétés algébriques. Ph.D. Thesis, Laboratoire Spécification et Vérification, ENS Cachan, France, 2006.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune. Vérification de protocoles de sécurité dans un modèle de l'intrus étendu. Master's Thesis, DEA Programmation, Paris, France,2003.
Details
BibTeX
Download:
[pdf]
Contract Reports
- Stéphanie Delaune and Ivan Gazeau. Combination issues. Deliverable VIP 4.2 (ANR-11-JS02-0006), June 2016. 5 pages
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune and Ivan Gazeau. Results on the case studies. Deliverable VIP 2.2 (ANR-11-JS02-0006), June 2016. 8 pages
Details
BibTeX
Download:
[pdf]
- David Baelde, Stéphanie Delaune, and Steve Kremer. Decision procedures for equivalence based properties (part II). Deliverable VIP 3.2 (ANR-11-JS02-0006), September 2015. 9 pages
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune and Steve Kremer. Composition results for equivalence-based security properties. Deliverable VIP 3.1 (ANR-11-JS02-0006), September 2015. 6 pages
Details
BibTeX
Download:
[pdf]
- Rémy Chrétien and Stéphanie Delaune. Formalising privacy-type security properties using the applied pi calculus. Deliverable VIP 1.1, (ANR-11-JS02-0006), March 2013. 54 pages
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune and Steve Kremer. Decision procedures for equivalence based properties. Deliverable VIP 3.1 (ANR-11-JS02-0006), December 2013. 117 pages
Details
BibTeX
Download:
[pdf]
- Lucca Hirschi and Stéphanie Delaune. Description of some case studies. Deliverable VIP 6.1, (ANR-11-JS02-0006), September 2013. 14 pages
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune. Algorithms for observational equivalence. Deliverable AVOTE 2.2, (ANR-07-SESU-002), January 2011. 118 pages
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune and Steve Kremer. Formalising security properties in electronic voting protocols. Deliverable AVOTE 1.2, (ANR-07-SESU-002), April 2010. 17 pages
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune and Steve Kremer. Spécificités des protocoles de vote électronique. Deliverable AVOTE 1.1 (ANR-07-SESU-002), January 2009. 8 pages
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune and Francis Klay. Synthèse des expérimentations. Technical Report 10, projet RNTL PROUVÉ, 2007. 10 pages
Details
BibTeX
Download:
[pdf]
- Francis Klay, Liana Bozga, Yassine Lakhnech, Laurent Mazaré, Stéphanie Delaune, and Steve Kremer. Retour d'expérience sur la validation du vote électronique. Technical Report 9, projet RNTL PROUVÉ, 2006. 47 pages
Details
BibTeX
Download:
[pdf]
- Liana Bozga, Stéphanie Delaune, Francis Klay, and Laurent Vigneron. Retour d'expérience sur la validation du porte-monnaie électronique. Technical Report 5, projet RNTL PROUVÉ, 2005. 29 pages
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Francis Klay, and Steve Kremer. Spécification du protocole de vote électronique. Technical Report 6, projet RNTL PROUVÉ, 2005. 19 pages
Details
BibTeX
Download:
[pdf]
- Vincent Bernat, Hubert Comon-Lundh, Véronique Cortier, Stéphanie Delaune, Florent Jacquemard, Pascal Lafourcade, Yassine Lakhnech, and Laurent Mazaré. Sufficient conditions on properties for an automated verification: theoretical report on the verification of protocols for an extended model of the intruder. Technical Report 4, projet RNTL PROUVÉ, 2004. 33 pages
Details
BibTeX
Download:
[pdf]
- Liana Bozga, Stéphanie Delaune, Francis Klay, and Ralf Treinen. Spécification du protocole de porte-monnaie électronique. Technical Report 1, projet RNTL PROUVÉ, 2004. 12 pages
Details
BibTeX
Download:
[pdf]
- Véronique Cortier, Stéphanie Delaune, and Pascal Lafourcade. A Survey of Algebraic Properties Used in Cryptographic Protocols. Technical Report 2, projet RNTL PROUVÉ, 2004. 19 pages
Details
BibTeX
Download:
[pdf]
Other Conferences
- Stéphanie Delaune, Steve Kremer, and Graham Steel. Formal Analysis of PKCS#11. In Proceedings of the 4th Taiwanese-French Conference on Information Technology (TFIT'08), pp. 267–278, Taipei, Taiwan, March 2008.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Receipt-Freeness: Formal Definition and Fault Attacks (Extended Abstract). In Proceedings of the Workshop Frontiers in Electronic Elections (FEE 2005), Milan, Italy, September 2005.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune and Florent Jacquemard. Narrowing-Based Constraint Solving for the Verification of Security Protocols. In Proceedings of the 18th International Workshop on Unification (UNIF'04), Cork, Ireland, July 2004.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune and Francis Klay. Vérification automatique appliquée à un protocole de commerce électronique. In Actes des 6èmes Journées Doctorales Informatique et Réseau (JDIR'04), pp. 260–269, Lannion, France, November 2004.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune. Intruder Deduction Problem in Presence of Guessing Attacks. In Proceedings of the Workshop on Security Protocols Verification (SPV'03), pp. 26–30, Marseilles, France, September 2003.
Details
BibTeX
Download:
[pdf]
Workshops
- Morten Dahl, Stéphanie Delaune, and Graham Steel. Formal Analysis of Privacy for Vehicular Mix-Zones. In Proceedings of the Workshop on Foundations of Security and Privacy (FCS-PrivMod'10), pp. 55–70, Edinburgh, Scotland, UK, July 2010.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, Mark D. Ryan, and Graham Steel. A Formal Analysis of Authentication in the TPM (short paper). In Preliminary Proceedings of the 8th International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'10), Paris, France, August 2010.
Details
BibTeX
Download:
[pdf]
- Mathilde Arnaud, Véronique Cortier, and Stéphanie Delaune. Modeling and Verifying Ad Hoc Routing Protocol. In Preliminary Proceedings of the 4th International Workshop on Security and Rewriting Techniques (SecReT'09), pp. 33–46, Port Jefferson, New York, USA, July 2009.
Details
BibTeX
Download:
[pdf]
- Vincent Cheval, Hubert Comon-Lundh, and Stéphanie Delaune. A decision procedure for proving observational equivalence. In Preliminary Proceedings of the 7th International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'09), Bologna, Italy, October 2009.
Details
BibTeX
Download:
[pdf]
- Stefan Ciobaca, Stéphanie Delaune, and Steve Kremer. Computing knowledge in security protocols under convergent equational theories. In Preliminary Proceedings of the 4th International Workshop on Security and Rewriting Techniques (SecReT'09), pp. 47–58, Port Jefferson, New York, USA, July 2009.
Details
BibTeX
Download:
[pdf]
- Véronique Cortier and Stéphanie Delaune. Deciding knowledge in security protocols for monoidal equational theories. In Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'07), pp. 63–80, Wrocław, Poland, July 2007.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Symbolic bisimulation for the applied pi calculus. In Preliminary Proceedings of the 5th International Workshop on Security Issues in Concurrency (SecCo'07), Lisbon, Portugal, September 2007.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune, Hai Lin, and Christopher Lynch. Protocol verification via rigid\slashflexible resolution. In Proceedings of the Workshop on Automated Deduction: Decidability, Complexity, Tractability (ADDCT'07), pp. 2–16, Bremen, Germany, July 2007.
Details
BibTeX
Download:
(unavailable)
- Stéphanie Delaune, Steve Kremer, and Mark D. Ryan. Verifying Properties of Electronic Voting Protocols. In Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE'06), pp. 45–52, Cambridge, UK, June 2006.
Details
BibTeX
Download:
[pdf]
Theses
- Stéphanie Delaune. Verification of security protocols: from confidentiality to privacy. Ph.D. Thesis, École Normale Supérieure de Cachan, France, 2011.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune. Vérification des protocoles cryptographiques et propriétés algébriques. Ph.D. Thesis, Laboratoire Spécification et Vérification, ENS Cachan, France, 2006.
Details
BibTeX
Download:
[pdf]
- Stéphanie Delaune. Vérification de protocoles de sécurité dans un modèle de l'intrus étendu. Master's Thesis, DEA Programmation, Paris, France,2003.
Details
BibTeX
Download:
[pdf]
Unspecified
- Mathilde Arnaud, Véronique Cortier, and Stéphanie Delaune. Modeling and Verifying Ad Hoc Routing Protocols. Research Report LSV-11-24, Laboratoire Spécification et Vérification, ENS Cachan, France, 2011. 66 pages
Details
BibTeX
Download:
[DOI]