Folgen
Benedikt Schmidt
Benedikt Schmidt
Snowflake
Bestätigte E-Mail-Adresse bei snowflake.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The TAMARIN prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
Computer Aided Verification: 25th International Conference, CAV 2013, Saint …, 2013
7932013
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, DA Basin
Proceedings of the 25rd IEEE Computer Security Foundations Symposium, CSF, 25-27, 2012
3192012
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE symposium on security and privacy, 113-127, 2012
2222012
Easycrypt: A tutorial
G Barthe, F Dupressoir, B Grégoire, C Kunz, B Schmidt, PY Strub
International School on Foundations of Security Analysis and Design, 146-166, 2012
1982012
Jasmin: High-assurance and high-speed cryptography
JB Almeida, M Barbosa, G Barthe, A Blot, B Grégoire, V Laporte, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1692017
Automated verification of group key agreement protocols
B Schmidt, R Sasse, C Cremers, D Basin
2014 IEEE Symposium on Security and Privacy, 179-194, 2014
642014
Key confirmation in key exchange: A formal treatment and implications for TLS 1.3
M Fischlin, F Günther, B Schmidt, B Warinschi
2016 IEEE Symposium on Security and Privacy (SP), 452-469, 2016
632016
Automated analysis of cryptographic assumptions in generic group models
G Barthe, E Fagerholm, D Fiore, J Mitchell, A Scedrov, B Schmidt
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
532014
Fully automated analysis of padding-based encryption in the computational model
G Barthe, JM Crespo, B Grégoire, C Kunz, Y Lakhnech, B Schmidt, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
532013
Formal analysis of key exchange protocols and physical protocols
B Schmidt
ETH Zurich, Switzerland, 2012
532012
Formal Reasoning about Physical Properties of Security Protocols
D Basin, S Capkun, P Schaller, B Schmidt
ACM Transactions on Information and System Security (TISSEC) 14 (2), 16, 2011
512011
Modeling and verifying physical properties of security protocols for wireless networks
P Schaller, B Schmidt, D Basin, S Capkun
Computer Security Foundations Symposium, 2009. CSF'09. 22nd IEEE, 109-123, 2009
512009
Machine-checked proofs of privacy for electronic voting protocols
V Cortier, CC Drăgan, F Dupressoir, B Schmidt, PY Strub, B Warinschi
2017 IEEE Symposium on Security and Privacy (SP), 993-1008, 2017
462017
Strongly‐optimal structure preserving signatures from Type II pairings: synthesis and lower bounds
G Barthe, E Fagerholm, D Fiore, A Scedrov, B Schmidt, M Tibouchi
IET Information Security 10 (6), 358-371, 2016
422016
Let’s get physical: Models and methods for real-world security protocols
D Basin, S Capkun, P Schaller, B Schmidt
Theorem Proving in Higher Order Logics, 1-22, 2009
352009
Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols
G Barthe, JM Crespo, Y Lakhnech, B Schmidt
Annual International Conference on the Theory and Applications of …, 2015
342015
Generic Transformations of Predicate Encodings: Constructions and Applications.
M Ambrona, G Barthe, B Schmidt
International Cryptology Conference, 2016
332016
Automated proofs of pairing-based cryptography
G Barthe, B Grégoire, B Schmidt
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
292015
Automated unbounded analysis of cryptographic constructions in the generic group model
M Ambrona, G Barthe, B Schmidt
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
242016
Certified synthesis of efficient batch verifiers
JA Akinyele, G Barthe, B Grégoire, B Schmidt, PY Strub
2014 IEEE 27th Computer Security Foundations Symposium, 153-165, 2014
92014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20