Cas J. F. Cremers

According to our database1, Cas J. F. Cremers authored at least 74 papers between 2003 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
The Provable Security of Ed25519: Theory and Practice.
IACR Cryptol. ePrint Arch., 2020

Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Eng. Bull., 2020

Decentralized Privacy-Preserving Proximity Tracing.
CoRR, 2020

2019
Secure authentication in the grid: A formal analysis of DNP3 SAv5.
J. Comput. Secur., 2019

Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures.
IACR Cryptol. ePrint Arch., 2019

Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman.
IACR Cryptol. ePrint Arch., 2019

Revisiting Post-Compromise Security Guarantees in Group Messaging.
IACR Cryptol. ePrint Arch., 2019

Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling real-world deployments with theoretically sound parameters.
IACR Cryptol. ePrint Arch., 2019

SoK: Computer-Aided Cryptography.
IACR Cryptol. ePrint Arch., 2019

Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Highly Efficient Key Exchange Protocols with Optimal Tightness.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Model Checking Security Protocols.
Proceedings of the Handbook of Model Checking., 2018

DECIM: Detecting Endpoint Compromise In Messaging.
IEEE Trans. Inf. Forensics Secur., 2018

Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Trans. Dependable Secur. Comput., 2018

Abstractions for security protocol verification.
J. Comput. Secur., 2018

When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.
IEEE Secur. Priv., 2018

Security Analysis for Randomness Improvements for Security Protocols.
IACR Cryptol. ePrint Arch., 2018

Strengthening the security of authenticated key exchange against bad randomness.
Des. Codes Cryptogr., 2018

2017
Symbolically analyzing security protocols using tamarin.
ACM SIGLOG News, 2017

ASICS: authenticated key exchange security incorporating certification systems.
Int. J. Inf. Sec., 2017

Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications.
IACR Cryptol. ePrint Arch., 2017

On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees.
IACR Cryptol. ePrint Arch., 2017

Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet.
IACR Cryptol. ePrint Arch., 2017

Improving Automated Symbolic Analysis for E-voting Protocols: A Method Based on Sufficient Conditions for Ballot Secrecy.
CoRR, 2017

Symbolic security analysis using the Tamarin prover.
Proceedings of the 2017 Formal Methods in Computer Aided Design, 2017

A Comprehensive Symbolic Analysis of TLS 1.3.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Improving the ISO/IEC 11770 standard for key management techniques.
Int. J. Inf. Sec., 2016

On Bitcoin Security in the Presence of Broken Crypto Primitives.
IACR Cryptol. ePrint Arch., 2016

On Post-Compromise Security.
IACR Cryptol. ePrint Arch., 2016

A Formal Security Analysis of the Signal Messaging Protocol.
IACR Cryptol. ePrint Arch., 2016

Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Symmetric polynomial & CRT based algorithms for multiple frequency determination from undersampled waveforms.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

On Bitcoin Security in the Presence of Broken Cryptographic Primitives.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Improving the Security of Cryptographic Protocol Standards.
IEEE Secur. Priv., 2015

How to detect unauthorised usage of a key.
IACR Cryptol. ePrint Arch., 2015

Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal.
Des. Codes Cryptogr., 2015

Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
Know Your Enemy: Compromising Adversaries in Protocol Analysis.
ACM Trans. Inf. Syst. Secur., 2014

On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness.
IACR Cryptol. ePrint Arch., 2014

Automated Verification of Group Key Agreement Protocols.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Actor Key Compromise: Consequences and Countermeasures.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

ARPKI: Attack Resilient Public-Key Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Efficient construction of machine-checked symbolic protocol security proofs.
J. Comput. Secur., 2013

Provably repairing the ISO/IEC 9798 standard for entity authentication.
J. Comput. Secur., 2013

The TAMARIN Prover for the Symbolic Analysis of Security Protocols.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

2012
Distance Hijacking Attacks on Distance Bounding Protocols.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

Operational Semantics and Verification of Security Protocols
Information Security and Cryptography, Springer, ISBN: 978-3-540-78636-8, 2012

2011
Distance Hijacking Attacks on Distance Bounding Protocols.
IACR Cryptol. ePrint Arch., 2011

One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability.
IACR Cryptol. ePrint Arch., 2011

Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2.
Proceedings of the Computer Security - ESORICS 2011, 2011

Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol.
Int. J. Appl. Cryptogr., 2010

Modeling and Analyzing Security in the Presence of Compromising Adversaries.
Proceedings of the Computer Security, 2010

Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries.
Proceedings of the Computer Science Logic, 24th International Workshop, 2010

Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Keeping data secret under full compromise using porter devices.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2009

From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries.
IACR Cryptol. ePrint Arch., 2009

Comparing State Spaces in Automatic Security Protocol Analysis.
Proceedings of the Formal to Practical Security, 2009

2008
A framework for compositional verification of security protocols.
Inf. Comput., 2008

Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol.
IACR Cryptol. ePrint Arch., 2008

Unbounded verification, falsification, and characterization of security protocols by pattern refinement.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

On the protocol composition logic PCL.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols.
Proceedings of the Computer Aided Verification, 20th International Conference, 2008

2007
Complete Characterization of Security Protocols by Pattern Refinement.
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007

2006
Injective synchronisation: An extension of the authentication hierarchy.
Theor. Comput. Sci., 2006

Preface.
Electron. Notes Theor. Comput. Sci., 2006

Compositionality of Security Protocols: A Research Agenda.
Electron. Notes Theor. Comput. Sci., 2006

Feasibility of Multi-Protocol Attacks.
Proceedings of the The First International Conference on Availability, 2006

2005
A Syntactic Criterion for Injectivity of Authentication Protocols.
Electron. Notes Theor. Comput. Sci., 2005

2004
Checking Secrecy by Means of Partial Order Reduction.
Proceedings of the System Analysis and Modeling, 4th International SDL and MSC Workshop, 2004

2003
Operational Semantics of Security Protocols.
Proceedings of the Scenarios: Models, 2003


  Loading...