Zobrazeno 1 - 10
of 116
pro vyhledávání: '"CREMERS, CAS"'
Autor:
Troncoso, Carmela, Payer, Mathias, Hubaux, Jean-Pierre, Salathé, Marcel, Larus, James, Bugnion, Edouard, Lueks, Wouter, Stadler, Theresa, Pyrgelis, Apostolos, Antonioli, Daniele, Barman, Ludovic, Chatel, Sylvain, Paterson, Kenneth, Čapkun, Srdjan, Basin, David, Beutel, Jan, Jackson, Dennis, Roeschlin, Marc, Leu, Patrick, Preneel, Bart, Smart, Nigel, Abidin, Aysajan, Gürses, Seda, Veale, Michael, Cremers, Cas, Backes, Michael, Tippenhauer, Nils Ole, Binns, Reuben, Cattuto, Ciro, Barrat, Alain, Fiore, Dario, Barbosa, Manuel, Oliveira, Rui, Pereira, José
This document describes and analyzes a system for secure and privacy-preserving proximity tracing at large scale. This system, referred to as DP3T, provides a technological foundation to help slow the spread of SARS-CoV-2 by simplifying and accelerat
Externí odkaz:
http://arxiv.org/abs/2005.12273
Autor:
Cremers, Cas, Hirschi, Lucca
We advance the state-of-the-art in automated symbolic analysis for e-voting protocols by introducing three conditions that together are sufficient to guarantee ballot secrecy. There are two main advantages to using our conditions, compared to existin
Externí odkaz:
http://arxiv.org/abs/1709.00194
Autor:
Cremers, Cas
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of the logic, as defined in [DDMP05,HSD+05,He05,Dat05,Der06,DDMR07]. The id
Externí odkaz:
http://arxiv.org/abs/0709.1080
Autor:
Andova, Suzana, Cremers, Cas, Gjosteen, Kristian, Mauw, Sjouke, Mjolsnes, Stig F., Radomirovic, Sasa
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is an attractive, but non-trivial approach. We have developed a frame
Externí odkaz:
http://arxiv.org/abs/cs/0611062
Autor:
Cheval, Vincent, Cremers, Cas, Dax, Alexander, Hirschi, Lucca, Jacomme, Charlie, Kremer, Steve
Publikováno v:
32nd USENIX Security Symposium
32nd USENIX Security Symposium, Aug 2023, Anaheim, United States
32nd USENIX Security Symposium, Aug 2023, Anaheim, United States
International audience; Most cryptographic protocols use cryptographic hash functions as a building block. The security analyses of these protocols typically assume that the hash functions are perfect (such as in the random oracle model). However, in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______165::1b17b79aaf218950f9da06683940c2d6
https://hal.science/hal-03795715/document
https://hal.science/hal-03795715/document
Publikováno v:
USENIX Security 2023
USENIX Security 2023, USENIX, Aug 2023, Anaheim, United States
USENIX Security 2023, USENIX, Aug 2023, Anaheim, United States
International audience; Many modern security protocols such as TLS, WPA2, WireGuard, and Signal use a cryptographic primitive called Authenticated Encryption (optionally with Authenticated Data), also known as an AEAD scheme. AEAD is a variant of sym
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______165::3ef6c2968b8dfd6269e30a16d70403b2
https://inria.hal.science/hal-04126116v2/file/AEAD-eprint.pdf
https://inria.hal.science/hal-04126116v2/file/AEAD-eprint.pdf
Autor:
TRONCOSO, CARMELA, BOGDANOV, DAN, BUGNION, EDOUARD, CHATEL, SYLVAIN, CREMERS, CAS, GÜRSES, SEDA, HUBAUX, JEAN-PIERRE, JACKSON, DENNIS, LARUS, JAMES R., LUEKS, WOUTER, OLIVEIRA, RUI, PAYER, MATHIAS, PRENEEL, BART, PYRGELIS, APOSTOLOS, SALATHÉ, MARCEL, STADLER, THERESA, VEALE, MICHAEL
Publikováno v:
Communications of the ACM; Sep2022, Vol. 65 Issue 9, p48-57, 10p, 2 Color Photographs
Publikováno v:
IEEE Security and Privacy Magazine
IEEE Security and Privacy Magazine, In press, ⟨10.1109/msec.2022.3154689⟩
IEEE Security and Privacy Magazine, In press, ⟨10.1109/msec.2022.3154689⟩
International audience; Tamarin is a mature, state-of-the-art tool for cryptographic protocol verification. We introduce Tamarin and survey some of the larger, tour-de-force results achieved with it. We also show how Tamarin can formalize a wide rang
Autor:
Cremers, Cas1 cas.cremers@cispa.saarland, Dehnel-Wild, Martin2 martin@dehnelwild.co.uk, Milner, Kevin2
Publikováno v:
Journal of Computer Security. 2019, Vol. 27 Issue 2, p203-232. 30p.