Cas Cremers

Orcid: 0000-0003-0322-2293

Affiliations:
  • CISPA Helmholtz Center for Information Security, Germany
  • Saarland University, Computer Science Department, Germany
  • University of Oxford, UK (former)
  • ETH Zurich, Switzerland (former)


According to our database1, Cas Cremers authored at least 96 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements.
IACR Cryptol. ePrint Arch., 2023

A Holistic Security Analysis of Monero Transactions.
IACR Cryptol. ePrint Arch., 2023

Keeping Up with the KEMs: Stronger Security Notions for KEMs.
IACR Cryptol. ePrint Arch., 2023

Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security.
IACR Cryptol. ePrint Arch., 2023

2022
Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols.
IEEE Secur. Priv., 2022

Provably Post-Quantum Secure Messaging with Strong Compromise Resilience and Immediate Decryption.
IACR Cryptol. ePrint Arch., 2022

TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation.
IACR Cryptol. ePrint Arch., 2022

Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations.
IACR Cryptol. ePrint Arch., 2022

Subterm-based proof techniques for improving the automation and scope of security protocol analysis.
IACR Cryptol. ePrint Arch., 2022

A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.
IACR Cryptol. ePrint Arch., 2022

Formal Analysis of SPDM: Security Protocol and Data Model version 1.2.
IACR Cryptol. ePrint Arch., 2022

Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
IACR Cryptol. ePrint Arch., 2022

FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation.
IACR Cryptol. ePrint Arch., 2022

Deploying decentralized, privacy-preserving proximity tracing.
Commun. ACM, 2022

CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Randomness Improvements for Security Protocols.
RFC, October, 2020

A Formal Security Analysis of the Signal Messaging Protocol.
J. Cryptol., 2020

BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.
IACR Cryptol. ePrint Arch., 2020

The Provable Security of Ed25519: Theory and Practice.
IACR Cryptol. ePrint Arch., 2020

Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Eng. Bull., 2020

Decentralized Privacy-Preserving Proximity Tracing.
CoRR, 2020

A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.
Proceedings of the 29th USENIX Security Symposium, 2020

A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters.
Proceedings of the 29th USENIX Security Symposium, 2020

Limiting the impact of unreliable randomness in deployed security protocols.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Secure authentication in the grid: A formal analysis of DNP3 SAv5.
J. Comput. Secur., 2019

Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures.
IACR Cryptol. ePrint Arch., 2019

Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman.
IACR Cryptol. ePrint Arch., 2019

Revisiting Post-Compromise Security Guarantees in Group Messaging.
IACR Cryptol. ePrint Arch., 2019

Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling real-world deployments with theoretically sound parameters.
IACR Cryptol. ePrint Arch., 2019

SoK: Computer-Aided Cryptography.
IACR Cryptol. ePrint Arch., 2019

Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Highly Efficient Key Exchange Protocols with Optimal Tightness.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Model Checking Security Protocols.
Proceedings of the Handbook of Model Checking., 2018

DECIM: Detecting Endpoint Compromise In Messaging.
IEEE Trans. Inf. Forensics Secur., 2018

Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Trans. Dependable Secur. Comput., 2018

Abstractions for security protocol verification.
J. Comput. Secur., 2018

When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.
IEEE Secur. Priv., 2018

Security Analysis for Randomness Improvements for Security Protocols.
IACR Cryptol. ePrint Arch., 2018

Strengthening the security of authenticated key exchange against bad randomness.
Des. Codes Cryptogr., 2018

2017
Symbolically analyzing security protocols using tamarin.
ACM SIGLOG News, 2017

ASICS: authenticated key exchange security incorporating certification systems.
Int. J. Inf. Sec., 2017

Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications.
IACR Cryptol. ePrint Arch., 2017

On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees.
IACR Cryptol. ePrint Arch., 2017

Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet.
IACR Cryptol. ePrint Arch., 2017

Improving Automated Symbolic Analysis for E-voting Protocols: A Method Based on Sufficient Conditions for Ballot Secrecy.
CoRR, 2017

Symbolic security analysis using the Tamarin prover.
Proceedings of the 2017 Formal Methods in Computer Aided Design, 2017

A Comprehensive Symbolic Analysis of TLS 1.3.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Improving the ISO/IEC 11770 standard for key management techniques.
Int. J. Inf. Sec., 2016

On Bitcoin Security in the Presence of Broken Crypto Primitives.
IACR Cryptol. ePrint Arch., 2016

On Post-Compromise Security.
IACR Cryptol. ePrint Arch., 2016

Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Symmetric polynomial & CRT based algorithms for multiple frequency determination from undersampled waveforms.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

On Bitcoin Security in the Presence of Broken Cryptographic Primitives.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Improving the Security of Cryptographic Protocol Standards.
IEEE Secur. Priv., 2015

How to detect unauthorised usage of a key.
IACR Cryptol. ePrint Arch., 2015

Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal.
Des. Codes Cryptogr., 2015

Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
Know Your Enemy: Compromising Adversaries in Protocol Analysis.
ACM Trans. Inf. Syst. Secur., 2014

On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness.
IACR Cryptol. ePrint Arch., 2014

Automated Verification of Group Key Agreement Protocols.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Actor Key Compromise: Consequences and Countermeasures.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

ARPKI: Attack Resilient Public-Key Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Efficient construction of machine-checked symbolic protocol security proofs.
J. Comput. Secur., 2013

Provably repairing the ISO/IEC 9798 standard for entity authentication.
J. Comput. Secur., 2013

The TAMARIN Prover for the Symbolic Analysis of Security Protocols.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

2012
Distance Hijacking Attacks on Distance Bounding Protocols.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

Operational Semantics and Verification of Security Protocols
Information Security and Cryptography, Springer, ISBN: 978-3-540-78636-8, 2012

2011
Distance Hijacking Attacks on Distance Bounding Protocols.
IACR Cryptol. ePrint Arch., 2011

One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability.
IACR Cryptol. ePrint Arch., 2011

Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2.
Proceedings of the Computer Security - ESORICS 2011, 2011

Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol.
Int. J. Appl. Cryptogr., 2010

Modeling and Analyzing Security in the Presence of Compromising Adversaries.
Proceedings of the Computer Security, 2010

Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries.
Proceedings of the Computer Science Logic, 24th International Workshop, 2010

Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Keeping data secret under full compromise using porter devices.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2009

From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries.
IACR Cryptol. ePrint Arch., 2009

Comparing State Spaces in Automatic Security Protocol Analysis.
Proceedings of the Formal to Practical Security, 2009

2008
A framework for compositional verification of security protocols.
Inf. Comput., 2008

Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol.
IACR Cryptol. ePrint Arch., 2008

Unbounded verification, falsification, and characterization of security protocols by pattern refinement.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

On the protocol composition logic PCL.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols.
Proceedings of the Computer Aided Verification, 20th International Conference, 2008

2007
Complete Characterization of Security Protocols by Pattern Refinement.
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007

2006
Injective synchronisation: An extension of the authentication hierarchy.
Theor. Comput. Sci., 2006

Feasibility of Multi-Protocol Attacks.
Proceedings of the The First International Conference on Availability, 2006

2005
Preface.
Proceedings of the First International Workshop on Security and Trust Management, 2005

A Syntactic Criterion for Injectivity of Authentication Protocols.
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, 2005

2004
Compositionality of Security Protocols: A Research Agenda.
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004

Checking Secrecy by Means of Partial Order Reduction.
Proceedings of the System Analysis and Modeling, 4th International SDL and MSC Workshop, 2004

2003
Operational Semantics of Security Protocols.
Proceedings of the Scenarios: Models, 2003


  Loading...