ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial B Blanchet, B Smyth, V Cheval, M Sylvestre Version from 16, 05-16, 2018 | 356* | 2018 |
Automated verification of equivalence properties of cryptographic protocols R Chadha, V Cheval, Ş Ciobâcă, S Kremer ACM Transactions on Computational Logic (TOCL) 17 (4), 1-32, 2016 | 196 | 2016 |
ProVerif: Cryptographic protocol verifier in the formal model B Blanchet, V Cheval, X Allamigeon, B Smyth | 164 | 2010 |
Proving more observational equivalences with ProVerif V Cheval, B Blanchet International conference on principles of security and trust, 226-246, 2013 | 101 | 2013 |
Trace equivalence decision: Negative tests and non-determinism V Cheval, H Comon-Lundh, S Delaune Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 93 | 2011 |
DEEPSEC: deciding equivalence properties in security protocols theory and practice V Cheval, S Kremer, I Rakotonirina 2018 IEEE symposium on security and privacy (SP), 529-546, 2018 | 90 | 2018 |
DTKI: A new formalized PKI with verifiable trusted parties J Yu, V Cheval, M Ryan The Computer Journal 59 (11), 1695-1713, 2016 | 83 | 2016 |
Deciding equivalence-based properties using constraint solving V Cheval, V Cortier, S Delaune Theoretical Computer Science 492, 1-39, 2013 | 79 | 2013 |
Apte: an algorithm for proving trace equivalence V Cheval Tools and Algorithms for the Construction and Analysis of Systems: 20th …, 2014 | 68 | 2014 |
Proverif with lemmas, induction, fast subsumption, and much more B Blanchet, V Cheval, V Cortier 2022 IEEE Symposium on Security and Privacy (SP), 69-86, 2022 | 51 | 2022 |
A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif V Cheval, V Cortier, M Turuani 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 344-358, 2018 | 44 | 2018 |
Automating security analysis: symbolic equivalence of constraint systems V Cheval, H Comon-Lundh, S Delaune Automated Reasoning: 5th International Joint Conference, IJCAR 2010 …, 2010 | 40 | 2010 |
The DEEPSEC prover V Cheval, S Kremer, I Rakotonirina Computer Aided Verification: 30th International Conference, CAV 2018, Held …, 2018 | 31 | 2018 |
Verifying privacy-type properties in a modular way M Arapinis, V Cheval, S Delaune 2012 IEEE 25th Computer Security Foundations Symposium, 95-109, 2012 | 29 | 2012 |
Composing security protocols: from confidentiality to privacy M Arapinis, V Cheval, S Delaune International Conference on Principles of Security and Trust, 324-343, 2015 | 27 | 2015 |
{SAPIC+}: protocol verifiers of the world, unite! V Cheval, C Jacomme, S Kremer, R Künnemann 31st USENIX Security Symposium (USENIX Security 22), 3935-3952, 2022 | 26 | 2022 |
Proverif 1.90: Automatic cryptographic protocol verifier, user manual and tutorial (2015) B Blanchet, B Smyth, V Cheval Originally appeared as Bruno Blanchet and Ben Smyth, 2011 | 25 | 2011 |
Lengths may break privacy–or how to check for equivalences with length V Cheval, V Cortier, A Plet | 25* | |
A procedure for deciding symbolic equivalence between sets of constraint systems V Cheval, H Comon-Lundh, S Delaune Information and Computation 255, 94-125, 2017 | 23 | 2017 |
Timing attacks in security protocols: symbolic framework and proof techniques V Cheval, V Cortier International Conference on Principles of Security and Trust, 280-299, 2015 | 21 | 2015 |