Cas Cremers
Orcid: 0000-0003-0322-2293Affiliations:
- CISPA Helmholtz Center for Information Security, Germany
- Saarland University, Computer Science Department, Germany
- University of Oxford, UK (former)
- ETH Zurich, Switzerland (former)
According to our database1,
Cas Cremers
authored at least 98 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.
IACR Cryptol. ePrint Arch., 2024
Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 2024
Secure Messaging with Strong Compromise Resilience, Temporal Privacy, and Immediate Decryption.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security.
IACR Cryptol. ePrint Arch., 2023
2022
IEEE Secur. Priv., 2022
Provably Post-Quantum Secure Messaging with Strong Compromise Resilience and Immediate Decryption.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations.
IACR Cryptol. ePrint Arch., 2022
Subterm-based proof techniques for improving the automation and scope of security protocol analysis.
IACR Cryptol. ePrint Arch., 2022
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter.
Proceedings of the 30th USENIX Security Symposium, 2021
2020
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
J. Comput. Secur., 2019
IACR Cryptol. ePrint Arch., 2019
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling real-world deployments with theoretically sound parameters.
IACR Cryptol. ePrint Arch., 2019
Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Proceedings of the Handbook of Model Checking., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Trans. Dependable Secur. Comput., 2018
When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.
IEEE Secur. Priv., 2018
IACR Cryptol. ePrint Arch., 2018
Des. Codes Cryptogr., 2018
2017
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications.
IACR Cryptol. ePrint Arch., 2017
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Improving Automated Symbolic Analysis for E-voting Protocols: A Method Based on Sufficient Conditions for Ballot Secrecy.
CoRR, 2017
Proceedings of the 2017 Formal Methods in Computer Aided Design, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Int. J. Inf. Sec., 2016
IACR Cryptol. ePrint Arch., 2016
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Symmetric polynomial & CRT based algorithms for multiple frequency determination from undersampled waveforms.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
Des. Codes Cryptogr., 2015
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
2014
ACM Trans. Inf. Syst. Secur., 2014
On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
J. Comput. Secur., 2013
J. Comput. Secur., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Computer Aided Verification - 25th International Conference, 2013
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
Information Security and Cryptography, Springer, ISBN: 978-3-540-78636-8, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol.
Int. J. Appl. Cryptogr., 2010
Proceedings of the Computer Security, 2010
Proceedings of the Computer Science Logic, 24th International Workshop, 2010
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2009
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Formal to Practical Security, 2009
2008
Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol.
IACR Cryptol. ePrint Arch., 2008
Unbounded verification, falsification, and characterization of security protocols by pattern refinement.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Computer Aided Verification, 20th International Conference, 2008
2007
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007
2006
Theor. Comput. Sci., 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, 2005
2004
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004
Proceedings of the System Analysis and Modeling, 4th International SDL and MSC Workshop, 2004
2003
Proceedings of the Scenarios: Models, 2003