Cas J. F. Cremers
Cas Cremers
Person information
- affiliation: University of Oxford, UK
- affiliation: ETH Zurich, Switzerland
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [j16]Michèle Feltz, Cas Cremers:
Strengthening the security of authenticated key exchange against bad randomness. Des. Codes Cryptography 86(3): 481-516 (2018) - [j15]Jiangshan Yu, Mark Ryan, Cas Cremers:
DECIM: Detecting Endpoint Compromise In Messaging. IEEE Trans. Information Forensics and Security 13(1): 106-118 (2018) - 2017
- [j14]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: authenticated key exchange security incorporating certification systems. Int. J. Inf. Sec. 16(2): 151-171 (2017) - [j13]David A. Basin, Cas Cremers, Jannik Dreier, Ralf Sasse:
Symbolically analyzing security protocols using tamarin. SIGLOG News 4(4): 19-30 (2017) - [c35]Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe:
A Comprehensive Symbolic Analysis of TLS 1.3. CCS 2017: 1773-1788 - [c34]Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan:
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. CSF 2017: 203-216 - [c33]Cas Cremers, Martin Dehnel-Wild, Kevin Milner:
Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5. ESORICS (1) 2017: 389-407 - [c32]Katriel Cohn-Gordon, Cas J. F. Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. EuroS&P 2017: 451-466 - [c31]
- [i19]Cas Cremers, Lucca Hirschi:
Improving Automated Symbolic Analysis for E-voting Protocols: A Method Based on Sufficient Conditions for Ballot Secrecy. CoRR abs/1709.00194 (2017) - [i18]Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan:
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. IACR Cryptology ePrint Archive 2017: 234 (2017) - [i17]Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner:
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. IACR Cryptology ePrint Archive 2017: 666 (2017) - [i16]Katriel Cohn-Gordon, Cas Cremers:
Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet. IACR Cryptology ePrint Archive 2017: 982 (2017) - 2016
- [j12]Cas Cremers, Marko Horvat:
Improving the ISO/IEC 11770 standard for key management techniques. Int. J. Inf. Sec. 15(6): 659-673 (2016) - [c30]Katriel Cohn-Gordon, Cas J. F. Cremers, Luke Garratt:
On Post-compromise Security. CSF 2016: 164-178 - [c29]Ilias Giechaskiel, Cas J. F. Cremers, Kasper Bonne Rasmussen:
On Bitcoin Security in the Presence of Broken Cryptographic Primitives. ESORICS (2) 2016: 201-222 - [c28]Hanshen Xiao, Cas Cremers, Hari Krishna Garg:
Symmetric polynomial & CRT based algorithms for multiple frequency determination from undersampled waveforms. GlobalSIP 2016: 202-206 - [c27]Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe:
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication. IEEE Symposium on Security and Privacy 2016: 470-485 - [i15]Ilias Giechaskiel, Cas Cremers, Kasper Bonne Rasmussen:
On Bitcoin Security in the Presence of Broken Crypto Primitives. IACR Cryptology ePrint Archive 2016: 167 (2016) - [i14]Katriel Cohn-Gordon, Cas Cremers, Luke Garratt:
On Post-Compromise Security. IACR Cryptology ePrint Archive 2016: 221 (2016) - [i13]Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. IACR Cryptology ePrint Archive 2016: 1013 (2016) - 2015
- [j11]Cas J. F. Cremers, Michèle Feltz:
Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal. Des. Codes Cryptography 74(1): 183-218 (2015) - [j10]David A. Basin, Cas J. F. Cremers, Kunihiko Miyazaki, Sasa Radomirovic, Dai Watanabe:
Improving the Security of Cryptographic Protocol Standards. IEEE Security & Privacy 13(3): 24-31 (2015) - [c26]Andrew C. Simpson, Andrew P. Martin, Cas J. F. Cremers, Ivan Flechais, Ivan Martinovic, Kasper Bonne Rasmussen:
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security. ICSE (2) 2015: 435-444 - [i12]Jiangshan Yu, Mark Ryan, Cas Cremers:
How to detect unauthorised usage of a key. IACR Cryptology ePrint Archive 2015: 486 (2015) - 2014
- [j9]David A. Basin, Cas Cremers:
Know Your Enemy: Compromising Adversaries in Protocol Analysis. ACM Trans. Inf. Syst. Secur. 17(2): 7:1-7:31 (2014) - [c25]David A. Basin, Cas J. F. Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski:
ARPKI: Attack Resilient Public-Key Infrastructure. ACM Conference on Computer and Communications Security 2014: 382-393 - [c24]David A. Basin, Cas J. F. Cremers, Marko Horvat:
Actor Key Compromise: Consequences and Countermeasures. CSF 2014: 244-258 - [c23]Cas Cremers, Marko Horvat:
Improving the ISO/IEC 11770 Standard for Key Management Techniques. SSR 2014: 215-235 - [c22]Benedikt Schmidt, Ralf Sasse, Cas Cremers, David A. Basin:
Automated Verification of Group Key Agreement Protocols. IEEE Symposium on Security and Privacy 2014: 179-194 - [i11]Michèle Feltz, Cas Cremers:
On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness. IACR Cryptology ePrint Archive 2014: 369 (2014) - 2013
- [j8]Simon Meier, Cas Cremers, David A. Basin:
Efficient construction of machine-checked symbolic protocol security proofs. Journal of Computer Security 21(1): 41-87 (2013) - [j7]David A. Basin, Cas Cremers, Simon Meier:
Provably repairing the ISO/IEC 9798 standard for entity authentication. Journal of Computer Security 21(6): 817-846 (2013) - [c21]Simon Meier, Benedikt Schmidt, Cas Cremers, David A. Basin:
The TAMARIN Prover for the Symbolic Analysis of Security Protocols. CAV 2013: 696-701 - [c20]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013: 381-399 - [i10]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. IACR Cryptology ePrint Archive 2013: 398 (2013) - 2012
- [b1]Cas Cremers, Sjouke Mauw:
Operational Semantics and Verification of Security Protocols. Information Security and Cryptography, Springer 2012, ISBN 978-3-540-78636-8, pp. 1-155 - [c19]Benedikt Schmidt, Simon Meier, Cas J. F. Cremers, David A. Basin:
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties. CSF 2012: 78-94 - [c18]Cas J. F. Cremers, Michèle Feltz:
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal. ESORICS 2012: 734-751 - [c17]Cas J. F. Cremers, Kasper Bonne Rasmussen, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. NDSS 2012 - [c16]David A. Basin, Cas J. F. Cremers, Simon Meier:
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication. POST 2012: 129-148 - [c15]Cas J. F. Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. IEEE Symposium on Security and Privacy 2012: 113-127 - [i9]Cas J. F. Cremers, Michèle Feltz:
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal. IACR Cryptology ePrint Archive 2012: 416 (2012) - 2011
- [c14]Cas Cremers:
Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK. AsiaCCS 2011: 80-91 - [c13]Cas J. F. Cremers:
Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2. ESORICS 2011: 315-334 - [i8]Cas J. F. Cremers, Kasper Bonne Rasmussen, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. IACR Cryptology ePrint Archive 2011: 129 (2011) - [i7]Cas J. F. Cremers, Michèle Feltz:
One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability. IACR Cryptology ePrint Archive 2011: 300 (2011) - 2010
- [j6]Cas J. F. Cremers:
Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol. IJACT 2(2): 83-99 (2010) - [c12]Christina Pöpper, David A. Basin, Srdjan Capkun, Cas J. F. Cremers:
Keeping data secret under full compromise using porter devices. ACSAC 2010: 241-250 - [c11]Simon Meier, Cas J. F. Cremers, David A. Basin:
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs. CSF 2010: 231-245 - [c10]David A. Basin, Cas J. F. Cremers:
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. CSL 2010: 1-18 - [c9]David A. Basin, Cas J. F. Cremers:
Modeling and Analyzing Security in the Presence of Compromising Adversaries. ESORICS 2010: 340-356
2000 – 2009
- 2009
- [c8]Cas J. F. Cremers:
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. ACNS 2009: 20-33 - [c7]Cas J. F. Cremers, Pascal Lafourcade, Philippe Nadeau:
Comparing State Spaces in Automatic Security Protocol Analysis. Formal to Practical Security 2009: 70-94 - [i6]David A. Basin, Cas J. F. Cremers:
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries. IACR Cryptology ePrint Archive 2009: 79 (2009) - [i5]Cas J. F. Cremers:
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange. IACR Cryptology ePrint Archive 2009: 253 (2009) - 2008
- [j5]Suzana Andova, Cas J. F. Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic:
A framework for compositional verification of security protocols. Inf. Comput. 206(2-4): 425-459 (2008) - [c6]Cas J. F. Cremers:
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. CAV 2008: 414-418 - [c5]
- [c4]Cas J. F. Cremers:
Unbounded verification, falsification, and characterization of security protocols by pattern refinement. ACM Conference on Computer and Communications Security 2008: 119-128 - [i4]Cas J. F. Cremers:
Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol. IACR Cryptology ePrint Archive 2008: 376 (2008) - 2007
- [i3]Cas J. F. Cremers:
Complete Characterization of Security Protocols by Pattern Refinement. Formal Protocol Verification Applied 2007 - [i2]
- 2006
- [j4]Cas J. F. Cremers:
Compositionality of Security Protocols: A Research Agenda. Electr. Notes Theor. Comput. Sci. 142: 99-110 (2006) - [j3]Sjouke Mauw, Valérie Issarny, Cas J. F. Cremers:
Preface. Electr. Notes Theor. Comput. Sci. 157(3): 1-2 (2006) - [j2]Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink:
Injective synchronisation: An extension of the authentication hierarchy. Theor. Comput. Sci. 367(1-2): 139-161 (2006) - [c3]
- [i1]Suzana Andova, Cas J. F. Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic:
A framework for compositional verification of security protocols. CoRR abs/cs/0611062 (2006) - 2005
- [j1]Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink:
A Syntactic Criterion for Injectivity of Authentication Protocols. Electr. Notes Theor. Comput. Sci. 135(1): 23-38 (2005) - 2004
- [c2]Cas J. F. Cremers, Sjouke Mauw:
Checking Secrecy by Means of Partial Order Reduction. SAM 2004: 171-188 - 2003
- [c1]Cas J. F. Cremers, Sjouke Mauw:
Operational Semantics of Security Protocols. Scenarios: Models, Transformations and Tools 2003: 66-89
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-03-20 23:17 CET by the dblp team