Follow
Véronique Cortier
Véronique Cortier
CNRS, LORIA
Verified email at loria.fr - Homepage
Title
Cited by
Cited by
Year
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
262*2006
A survey of algebraic properties used in cryptographic protocols
V Cortier, S Delaune, P Lafourcade
Journal of Computer Security 14 (1), 1-43, 2006
2402006
Attacking and fixing Helios: An analysis of ballot secrecy
V Cortier, B Smyth
Journal of Computer Security 21 (1), 89-148, 2013
2382013
Deciding knowledge in security protocols under equational theories
M Abadi, V Cortier
Theoretical Computer Science 367 (1-2), 2-32, 2006
2152006
Computationally sound, automated proofs for security protocols
V Cortier, B Warinschi
European Symposium on Programming, 157-171, 2005
1952005
SoK: A comprehensive analysis of game-based ballot privacy definitions
D Bernhard, V Cortier, D Galindo, O Pereira, B Warinschi
2015 IEEE Symposium on Security and Privacy, 499-516, 2015
1752015
Sok: Verifiability notions for e-voting protocols
V Cortier, D Galindo, R Küsters, J Müller, T Truderung
2016 IEEE Symposium on Security and Privacy (SP), 779-798, 2016
1652016
Election verifiability for helios under weaker trust assumptions
V Cortier, D Galindo, S Glondu, M Izabachene
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
1622014
A survey of symbolic methods in computational analysis of cryptographic systems
V Cortier, S Kremer, B Warinschi
Journal of Automated Reasoning 46, 225-259, 2011
1492011
Computational soundness of observational equivalence
H Comon-Lundh, V Cortier
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1302008
New decidability results for fragments of first-order logic and application to cryptographic protocols
H Comon-Lundh, V Cortier
International Conference on Rewriting Techniques and Applications, 148-164, 2003
1272003
Adapting Helios for provable ballot privacy
D Bernhard, V Cortier, O Pereira, B Smyth, B Warinschi
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
1202011
BeleniosRF: A non-interactive receipt-free electronic voting scheme
P Chaidos, V Cortier, G Fuchsbauer, D Galindo
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1162016
Tree automata with one memory set constraints and cryptographic protocols
H Comon, V Cortier
Theoretical Computer Science 331 (1), 143-214, 2005
1062005
Security properties: two agents are sufficient
H Comon-Lundh, V Cortier
European Symposium On Programming, 99-113, 2003
962003
A method for proving observational equivalence
V Cortier, S Delaune
2009 22nd IEEE Computer Security Foundations Symposium, 266-276, 2009
942009
Belenios: a simple private and verifiable electronic voting system
V Cortier, P Gaudry, S Glondu
Foundations of Security, Protocols, and Equational Reasoning: Essays …, 2019
932019
Safely composing security protocols
V Cortier, S Delaune
Formal Methods in System Design 34, 1-36, 2009
872009
Flatness is not a weakness
H Comon, V Cortier
International workshop on computer science logic, 262-276, 2000
862000
Deciding knowledge in security protocols under equational theories
M Abadi, V Cortier
Automata, Languages and Programming: 31st International Colloquium, ICALP …, 2004
842004
The system can't perform the operation now. Try again later.
Articles 1–20