Number of items: 10.
Cheval, Vincent and Cremers, Cas and Dax, Alexander and Hirschi, Lucca and Jacomme, Charlie and Kremer, Steve
(2023)
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
Cheval, Vincent and Jacomme, Charlie and Kremer, Steve and Künnemann, Robert
(2022)
SAPIC+: protocol verifiers of the world, unite!
(In Press)
Backes, Michael and Dreier, Jannik and Kremer, Steve and Künnemann, Robert
(2017)
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange.
Kremer, Steve and Künnemann, Robert
(2016)
Automated analysis of security protocols with global state.
Journal of Computer Security.
Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015)
Type-Based Verification of Electronic Voting Protocols.
Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015)
Type-Based Verification of Electronic Voting Protocols.
Kremer, Steve and Künnemann, Robert
(2014)
Automated Analysis of Security Protocols with Global State.
Kremer, Steve and Künnemann, Robert and Steel, Graham
(2013)
Universally Composable Key-Management.
Delaune, Stephanie and Kremer, Steve and Ryan, Mark D. and Steel, Graham
(2011)
Formal analysis of protocols based on TPM state registers.
Kremer, Steve and Steel, Graham and Warinschi, Bogdan
(2011)
Security for Key Management Interfaces.
This list was generated on Wed Nov 13 16:01:12 2024 CET.