What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Véronique Cortier
Google Scholar
30
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Vote&Check: Secure Postal Voting with Reduced Trust Assumptions.
Véronique Cortier
Alexandre Debant
Pierrick Gaudry
Léo Louistisserand
2025
conf/esorics
Breaking Verifiability and Vote Privacy in CHVote.
Véronique Cortier
Alexandre Debant
Pierrick Gaudry
2024
conf/uss
Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility.
Véronique Cortier
Alexandre Debant
Anselme Goetschmann
Lucca Hirschi
2024
conf/esorics
Code Voting: When Simplicity Meets Security.
Véronique Cortier
Alexandre Debant
Florian Moser
2023
conf/fc
Belenios with Cast as Intended.
Véronique Cortier
Alexandre Debant
Pierrick Gaudry
Stéphane Glondu
2022
conf/ccs
Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability.
Mikael Bougon
Hervé Chabanne
Véronique Cortier
Alexandre Debant
Emmanuelle Dottax
Jannik Dreier
Pierrick Gaudry
Mathieu Turuani
2022
conf/sp
ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.
Bruno Blanchet
Vincent Cheval
Véronique Cortier
2022
conf/esorics
A Toolbox for Verifiable Tally-Hiding E-Voting Systems.
Véronique Cortier
Pierrick Gaudry
Quentin Yang
2020
conf/esorics
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols.
Véronique Cortier
Stéphanie Delaune
Jannik Dreier
2018
conf/ccs
Voting: You Can't Have Privacy without Individual Verifiability.
Véronique Cortier
Joseph Lallemand
2018
conf/eurosp
A Formal Analysis of the Neuchatel e-Voting Protocol.
Véronique Cortier
David Galindo
Mathieu Turuani
2018
conf/esorics
Efficiently Deciding Equivalence for Standard Primitives and Phases.
Véronique Cortier
Antoine Dallon
Stéphanie Delaune
2017
conf/ccs
A Type System for Privacy Properties.
Véronique Cortier
Niklas Grimm
Joseph Lallemand
Matteo Maffei
2017
conf/sp
Machine-Checked Proofs of Privacy for Electronic Voting Protocols.
Véronique Cortier
Constantin Catalin Dragan
François Dupressoir
Benedikt Schmidt
Pierre-Yves Strub
Bogdan Warinschi
2017
conf/eurosp
Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices.
Véronique Cortier
Alicia Filipiak
Jan Florent
Said Gharout
Jacques Traoré
2016
conf/ccs
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme.
Pyrros Chaidos
Véronique Cortier
Georg Fuchsbauer
David Galindo
2016
conf/sp
SoK: Verifiability Notions for E-Voting Protocols.
Véronique Cortier
David Galindo
Ralf Küsters
Johannes Müller
Tomasz Truderung
2016
conf/esorics
When Are Three Voters Enough for Privacy Properties?
Myrto Arapinis
Véronique Cortier
Steve Kremer
2015
conf/sp
SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions.
David Bernhard
Véronique Cortier
David Galindo
Olivier Pereira
Bogdan Warinschi
2015
conf/esorics
Checking Trace Equivalence: How to Get Rid of Nonces?
Rémy Chrétien
Véronique Cortier
Stéphanie Delaune
2014
conf/esorics
Election Verifiability for Helios under Weaker Trust Assumptions.
Véronique Cortier
David Galindo
Stéphane Glondu
Malika Izabachène
2013
conf/ccs
Deduction soundness: prove one, get five for free.
Florian Böhl
Véronique Cortier
Bogdan Warinschi
2012
conf/ccs
Revoke and let live: a secure key revocation api for cryptographic devices.
Véronique Cortier
Graham Steel
Cyrille Wiedling
2012
conf/ccs
Measuring vote privacy, revisited.
David Bernhard
Véronique Cortier
Olivier Pereira
Bogdan Warinschi
2011
conf/ccs
A composable computational soundness notion.
Véronique Cortier
Bogdan Warinschi
2011
conf/esorics
Adapting Helios for Provable Ballot Privacy.
David Bernhard
Véronique Cortier
Olivier Pereira
Ben Smyth
Bogdan Warinschi
2009
conf/esorics
A Generic Security API for Symmetric Key Management on Cryptographic Devices.
Véronique Cortier
Graham Steel
2008
conf/ccs
Computational soundness of observational equivalence.
Hubert Comon-Lundh
Véronique Cortier
2007
conf/esorics
A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols.
Véronique Cortier
Ralf Küsters
Bogdan Warinschi
2007
conf/esorics
Synthesizing Secure Protocols.
Véronique Cortier
Bogdan Warinschi
Eugen Zalinescu
Coauthors
Alexandre Debant
(6)
Alicia Filipiak
(1)
Anselme Goetschmann
(1)
Antoine Dallon
(1)
Ben Smyth
(1)
Benedikt Schmidt
(1)
Bogdan Warinschi
(8)
Bruno Blanchet
(1)
Constantin Catalin Dragan
(1)
Cyrille Wiedling
(1)
David Bernhard
(3)
David Galindo
(5)
Emmanuelle Dottax
(1)
Eugen Zalinescu
(1)
Florian Böhl
(1)
Florian Moser
(1)
François Dupressoir
(1)
Georg Fuchsbauer
(1)
Graham Steel
(2)
Hervé Chabanne
(1)
Hubert Comon-Lundh
(1)
Jacques Traoré
(1)
Jan Florent
(1)
Jannik Dreier
(2)
Johannes Müller
(1)
Joseph Lallemand
(2)
Léo Louistisserand
(1)
Lucca Hirschi
(1)
Malika Izabachène
(1)
Mathieu Turuani
(2)
Matteo Maffei
(1)
Mikael Bougon
(1)
Myrto Arapinis
(1)
Niklas Grimm
(1)
Olivier Pereira
(3)
Pierre-Yves Strub
(1)
Pierrick Gaudry
(5)
Pyrros Chaidos
(1)
Quentin Yang
(1)
Ralf Küsters
(2)
Rémy Chrétien
(1)
Saïd Gharout
(1)
Stéphane Glondu
(2)
Stéphanie Delaune
(3)
Steve Kremer
(1)
Tomasz Truderung
(1)
Véronique Cortier
(30)
Vincent Cheval
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to