Number of items: 42.
Cremers, Cas and Ronen, Eyal and Zhao, Mang
(2024)
Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements.
(Submitted)
Cremers, Cas and Zhao, Mang
(2024)
Secure Messaging with Strong Compromise Resilience, Temporal Privacy, and Immediate Decryption.
(Submitted)
Cremers, Cas and Dax, Alexander and Jacomme, Charlie and Zhao, Mang
(2023)
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security.
(Submitted)
Cremers, Cas and Jacomme, Charlie and Naska, Aurora
(2023)
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations.
(Submitted)
Cheval, Vincent and Cremers, Cas and Dax, Alexander and Hirschi, Lucca and Jacomme, Charlie and Kremer, Steve
(2023)
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
Bindel, Nina and Cremers, Cas and Zhao, Mang
(2023)
FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation.
(In Press)
Cremers, Cas and Dax, Alexander and Naska, Aurora
(2023)
Formal Analysis of SPDM: Security Protocol and Data Model version 1.2.
Troncoso, Carmela and Bogdanov, Dan and Bugnion, Edouard and Chatel, Sylva and Cremers, Cas and Gürses, Seda and Hubaux, Jean-Pierre and Jackson, Dennis and Larus, James and Lueks, Wouter and Oliveira, Rui and Payer, Mathias and Preneel, Bart and Pyrgelis, Apostolos and Salathé, Marcel and Stadler, Theresa and Veale, Michael
(2022)
Deploying decentralized, privacy-preserving proximity tracing.
Communications of the ACM, 65 (9).
ISSN 0001-0782
Cremers, Cas and Jacomme, Charlie and Lukert, Philip
(2022)
Subterm-based proof techniques for improving the automation and scope of security protocol analysis.
Cremers, Cas and Naor, Moni and Paz, Shahar and Ronen, Eyal
(2022)
CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs.
Basin, David and Cremers, Cas and Dreier, Jannik and Sasse, Ralf
(2022)
Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols.
IEEE Security and Privacy.
ISSN 1540-7993
Cremers, Cas and Fontaine, Caroline and Jacomme, Charlie
(2022)
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.
Cremers, Cas and Hale, Britta and Kohbrok, Konrad
(2021)
The Complexities of Healing in Secure Group Messaging: Why {Cross-Group} Effects Matter.
Cremers, Cas and Düzlü, Samed and Fiedler, Rune and Fischlin, Marc and Janson, Christian
(2021)
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.
(In Press)
Brendel, Jacqueline and Cremers, Cas and Jackson, Dennis and Zhao, Mang
(2021)
The Provable Security of Ed25519: Theory and Practice.
(In Press)
Barbosa, Manuel and Barthe, Gilles and Bhargavan, Karthik and Blanchet, Bruno and Cremers, Cas and Liao, Kevin and Parno, Brian
(2021)
SoK: Computer-Aided Cryptography.
(In Press)
Cohn-Gordon, Katriel and Cremers, Cas and Dowling, Benjamin and Garratt, Luke and Stebila, Douglas
(2020)
A Formal Security Analysis of Key Establishment in the Signal Messaging Protocol.
Journal of Cryptology.
(In Press)
Cremers, Cas and Kiesl, Benjamin and Medinger, Niklas
(2020)
A Formal Analysis of IEEE 802.11’s WPA2: Countering the Kracks Caused by Cracking the Counters.
Akhmetzyanova, Liliya and Cremers, Cas and Garratt, Luke and Smyshlyaev, Stanislav and Sullivan, Nick
(2020)
Limiting the impact of unreliable randomness in deployed security protocols.
Girol, Guillaume and Hirschi, Lucca and Sasse, Ralf and Jackson, Dennis and Cremers, Cas and Basin, David
(2020)
A Spectral Analysis of Noise:A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.
Cremers, Cas and Fairoze, Jaiden and Kiesl, Benjamin and Naska, Aurora
(2020)
Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice.
(In Press)
Troncoso, Carmela and Payer, Matthias and Hubaux, Jean-Pierre and Salathé, Marcel and Larus, James and Lueks, Wouter and Stadler, Theresa and Pyrgelis, Apostolos and Antonioli, Daniele and Barman, Ludovic and Chatel, Sylvain and Paterson, Kenneth G. and Capkun, Srdjan and Basin, David and Beutel, Jan and Jackson, Dennis and Roeschlin, Marc and Leu, Patrick and Preneel, Bart and Smart, Nigel and Abidin, Aysajan and Gürses, Seda and Veale, Michael and Cremers, Cas and Backes, Michael and Tippenhauer, Nils Ole and Binns, Reuben and Cattuto, Ciro and Barrat, Alain and Fiore, Dario and Barbosa, Manuel and Oliveira, Rui and Pereira, José
(2020)
Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Engineering Bulletin Volume 43, Number 2, June 2020.
pp. 36-66.
Jackson, Dennis and Cremers, Cas and Cohn-Gordon, Katriel and Sasse, Ralf
(2019)
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that use Signatures.
(In Press)
Cohn-Gordon, Katriel and Cremers, Cas and Gjøsteen, Kristian and Jacobsen, Hakon and Jager, Tibor
(2019)
Highly Efficient Key Exchange Protocols with Optimal Tightness: Enabling real-world deployments with theoretically sound parameters.
(In Press)
Cremers, Cas and Jackson, Dennis
(2019)
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman.
Cremers, Cas and Hirschi, Lucca
(2019)
Improving Automated Symbolic Analysis of Ballot Secrecy for E-voting Protocols: A Method Based on Sufficient Conditions.
Cremers, Cas and Dehnel-Wild, Martin and Milner, Kevin
(2019)
Secure Authentication in the Grid: A Formal Analysis of DNP3 SAv5.
Journal of Computer Security, 27 (2).
pp. 203-232.
Cremers, Cas and Dehnel-Wild, Martin
(2019)
Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion.
(In Press)
Cohn-Gordon, Katriel and Cremers, Cas and Garratt, Luke and Millican, Jon and Milner, Kevin
(2018)
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees.
Thanh Nguyen, Binh and Sprenger, Christoph and Cremers, Cas
(2018)
Abstractions for security protocol verification.
Journal of Computer Security.
(In Press)
Yu, Jiangshan and Ryan, Mark and Cremers, Cas
(2018)
DECIM: Detecting Endpoint Compromise In Messaging.
IEEE Transactions on Information Forensics and Security, 13 (1).
pp. 106-118.
Basin, David and Cremers, Cas and Kim, Tiffany Hyun-Jin and Perrig, Adrian and Sasse, Ralf and Szalachowski, Pavel
(2018)
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Transactions on Dependable and Secure Computing, 15 (3).
pp. 393-408.
Basin, David and Cremers, Cas and Meadows, Catherine A.
(2018)
Model Checking Security Protocols.
In:
Handbook of Model Checking.
Springer International Publishing, pp. 727-762.
ISBN 978-3-319-10574-1
Feltz, Michèle and Cremers, Cas
(2018)
Strengthening the Security of Authenticated Key Exchange against Bad Randomness.
Designs, Codes and Cryptography, 86 (3).
pp. 481-516.
Giechaskiel, Ilias and Cremers, Cas and Rasmussen, Kasper B.
(2018)
When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.
IEEE Security & Privacy.
Boyd, Colin and Cremers, Cas and Feltz, Michèle and Paterson, Kenneth G. and Poettering, Bertram and Stebila, Douglas
(2017)
ASICS: Authenticated Key Exchange Security Incorporating
Certification Systems.
International Journal of Information Security, 16 (2).
pp. 151-171.
Milner, Kevin and Cremers, Cas and Jiangshan, Yu and Ryan, Mark
(2017)
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications.
Cremers, Cas and Horvat, Marko and Hoyland, Jonathan and Scott, Sam and van der Merwe, Thyla
(2017)
A Comprehensive Symbolic Analysis of TLS 1.3.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.
Cohn-Gordon, Katriel and Cremers, Cas and Dowling, Benjamin and Stebila, Douglas
(2017)
A Formal Security Analysis of the Signal Messaging Protocol.
Cremers, Cas and Dehnel-Wild, Martin and Milner, Kevin
(2017)
Secure Authentication in the Grid:
A Formal Analysis of DNP3: SAv5.
Basin, David and Cremers, Cas and Dreier, Jannik and Sasse, Ralf
(2017)
Symbolically Analyzing Security Protocols Using Tamarin.
SIGLOG News, 4 (4).
pp. 19-30.
Basin, David and Cremers, Cas and Meier, Simon
(2012)
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication.
This list was generated on Sun Dec 22 10:25:19 2024 CET.