Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
- C. Cremers
- Computer Science, MathematicsCAV
- 7 July 2008
TLDR
The TAMARIN Prover for the Symbolic Analysis of Security Protocols
- Simon Meier, Benedikt Schmidt, C. Cremers, D. Basin
- Computer ScienceCAV
- 13 July 2013
The Tamarin prover supports the automated, unbounded, symbolic analysis of security protocols. It features expressive languages for specifying protocols, adversary models, and properties, and support…
Decentralized Privacy-Preserving Proximity Tracing
- C. Troncoso, Mathias Payer, J. Pereira
- Computer ScienceIEEE Data Eng. Bull.
- 25 May 2020
TLDR
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
- Benedikt Schmidt, Simon Meier, C. Cremers, D. Basin
- Computer Science, MathematicsIEEE 25th Computer Security Foundations Symposium
- 25 June 2012
TLDR
A Formal Security Analysis of the Signal Messaging Protocol
- Katriel Cohn-Gordon, C. Cremers, Benjamin Dowling, L. Garratt, D. Stebila
- Computer ScienceIEEE European Symposium on Security and Privacy…
- 26 April 2017
TLDR
ARPKI: Attack Resilient Public-Key Infrastructure
- D. Basin, C. Cremers, T. Kim, A. Perrig, R. Sasse, Pawel Szalachowski
- Computer ScienceCCS
- 3 November 2014
TLDR
Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2
- C. Cremers
- Computer ScienceESORICS
- 12 September 2011
TLDR
Distance Hijacking Attacks on Distance Bounding Protocols
- C. Cremers, Kasper Bonne Rasmussen, Srdjan Capkun
- Computer Science, MathematicsIEEE Symposium on Security and Privacy
- 20 May 2012
TLDR
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
- Katriel Cohn-Gordon, C. Cremers, L. Garratt, J. Millican, Kevin Milner
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 8 October 2018
TLDR
Operational Semantics and Verification of Security Protocols
- C. Cremers, S. Mauw
- Computer Science, MathematicsInformation Security and Cryptography
- 30 October 2012
TLDR
...
...