Number of items: 10.
Conference or Workshop Item (A Paper)
Cheval, Vincent and Cremers, Cas and Dax, Alexander and Hirschi, Lucca and Jacomme, Charlie and Kremer, Steve
(2023)
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
Cheval, Vincent and Jacomme, Charlie and Kremer, Steve and Künnemann, Robert
(2022)
SAPIC+: protocol verifiers of the world, unite!
(In Press)
Backes, Michael and Dreier, Jannik and Kremer, Steve and Künnemann, Robert
(2017)
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange.
Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015)
Type-Based Verification of Electronic Voting Protocols.
Kremer, Steve and Künnemann, Robert
(2014)
Automated Analysis of Security Protocols with Global State.
Kremer, Steve and Künnemann, Robert and Steel, Graham
(2013)
Universally Composable Key-Management.
Delaune, Stephanie and Kremer, Steve and Ryan, Mark D. and Steel, Graham
(2011)
Formal analysis of protocols based on TPM state registers.
Kremer, Steve and Steel, Graham and Warinschi, Bogdan
(2011)
Security for Key Management Interfaces.
Article
Kremer, Steve and Künnemann, Robert
(2016)
Automated analysis of security protocols with global state.
Journal of Computer Security.
Other
Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015)
Type-Based Verification of Electronic Voting Protocols.
This list was generated on Sun Dec 22 04:02:01 2024 CET.