Cas Cremers
Computer scientist
Cas Cremers's AcademicInfluence.com Rankings
Download Badge
Computer Science
Cas Cremers's Degrees
- PhD Computer Science University of Oxford
- Masters Computer Science University of Oxford
- Bachelors Computer Science University of Oxford
Similar Degrees You Can Earn
Why Is Cas Cremers Influential?
(Suggest an Edit or Addition)According to Wikipedia, Casimier Joseph Franciscus "Cas" Cremers is a computer scientist and a faculty member at the CISPA Helmholtz Center for Information Security in Saarbruecken, Germany. Career Cremers received his PhD from Eindhoven University of Technology in 2006, under the supervision of Sjouke Mauw and Erik de Vink. Between 2006 and 2013, he worked at the Information Security Group at ETH Zurich, Switzerland, until joining the University of Oxford in 2013. He was made full professor of Information Security in 2015. His research focuses on information security, in particular the formal analysis of security protocols. This work ranges from developing mathematical foundations for protocol analysis to the development of analysis tools, notably the Scyther and Tamarin tools. Recently his research expanded into directions such as protocol standardisation, including the improvement of the ISO/IEC 9798 standard, and applied cryptography, leading to the development of new security requirements and protocols. His joint work with Marko Horvat, Sam Scott, and Thyla van der Merwe led to a not insignificant change to the TLS 1.3 specification.
Cas Cremers's Published Works
Published Works
- The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols (2008) (599)
- The TAMARIN Prover for the Symbolic Analysis of Security Protocols (2013) (492)
- Decentralized Privacy-Preserving Proximity Tracing (2020) (279)
- A Formal Security Analysis of the Signal Messaging Protocol (2017) (234)
- Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties (2012) (233)
- Distance Hijacking Attacks on Distance Bounding Protocols (2012) (188)
- A Comprehensive Symbolic Analysis of TLS 1.3 (2017) (150)
- Operational Semantics and Verification of Security Protocols (2012) (135)
- ARPKI: Attack Resilient Public-Key Infrastructure (2014) (133)
- On Post-compromise Security (2016) (96)
- Provably repairing the ISO/IEC 9798 standard for entity authentication (2012) (92)
- On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees (2018) (89)
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (2012) (88)
- Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication (2016) (84)
- Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2 (2011) (80)
- Comparing State Spaces in Automatic Security Protocol Analysis (2009) (78)
- Unbounded verification, falsification, and characterization of security protocols by pattern refinement (2008) (75)
- A framework for compositional verification of security protocols (2006) (73)
- Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion (2019) (69)
- Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK (2011) (67)
- Operational Semantics of Security Protocols (2003) (67)
- Injective synchronisation: An extension of the authentication hierarchy (2006) (66)
- SoK: Computer-Aided Cryptography (2021) (63)
- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol (2009) (61)
- Modeling and Analyzing Security in the Presence of Compromising Adversaries (2010) (60)
- Feasibility of multi-protocol attacks (2006) (58)
- Automated Verification of Group Key Agreement Protocols (2014) (44)
- One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability (2011) (41)
- Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure (2016) (41)
- Know Your Enemy: Compromising Adversaries in Protocol Analysis (2014) (39)
- Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange (2009) (39)
- On Bitcoin Security in the Presence of Broken Cryptographic Primitives (2016) (39)
- Checking Secrecy by Means of Partial Order Reduction (2004) (37)
- Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs (2010) (36)
- Compositionality of Security Protocols: A Research Agenda (2004) (34)
- Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5 (2017) (32)
- Improving the Security of Cryptographic Protocol Standards (2015) (30)
- Improving the ISO/IEC 11770 standard for key management techniques (2014) (30)
- ASICS: authenticated key exchange security incorporating certification systems (2013) (28)
- Symbolically analyzing security protocols using tamarin (2017) (27)
- Defining authentication in a trace model (2003) (26)
- The Provable Security of Ed25519: Theory and Practice (2021) (25)
- Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling real-world deployments with theoretically sound parameters (2019) (25)
- When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives (2018) (24)
- Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries (2010) (23)
- Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures (2019) (23)
- DECIM: Detecting Endpoint Compromise In Messaging (2018) (22)
- Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman (2019) (21)
- Model Checking Security Protocols (2018) (20)
- A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols (2020) (20)
- On Bitcoin Security in the Presence of Broken Crypto Primitives (2016) (19)
- A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters (2020) (18)
- Formal methods for security protocols : three examples of the black-box approach (2003) (16)
- Efficient construction of machine-checked symbolic protocol security proofs (2013) (15)
- Comparing State Spaces in Automatic Security Protocol Verification (2007) (15)
- Keeping data secret under full compromise using porter devices (2010) (14)
- On the protocol composition logic PCL (2007) (13)
- Generalizing Needham-Schroeder-Lowe for multi-party authentication (2006) (11)
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol (2010) (11)
- Scyther: Unbounded verification of security protocols (2011) (11)
- Comparing State Spaces in Automatic Protocol Verification (2007) (11)
- How to detect unauthorised usage of a key (2015) (10)
- Actor Key Compromise: Consequences and Countermeasures (2014) (10)
- From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries (2009) (9)
- Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications (2017) (9)
- A Syntactic Criterion for Injectivity of Authentication Protocols (2005) (9)
- The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter (2021) (9)
- Strengthening the security of authenticated key exchange against bad randomness (2018) (8)
- Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions (2019) (8)
- Symmetric polynomial & CRT based algorithms for multiple frequency determination from undersampled waveforms (2016) (8)
- Evaluation of ISO/IEC 9798 Protocols (2011) (7)
- Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice (2020) (7)
- On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness (2014) (7)
- BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures (2021) (6)
- Verification of multi-protocol attacks (2005) (5)
- Improving Automated Symbolic Analysis for E-voting Protocols: A Method Based on Sufficient Conditions for Ballot Secrecy (2017) (4)
- Revisiting Post-Compromise Security Guarantees in Group Messaging (2019) (4)
- Randomness Improvements for Security Protocols (2020) (4)
- Deploying decentralized, privacy-preserving proximity tracing (2022) (3)
- Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet (2017) (3)
- Symbolic security analysis using the Tamarin prover (2017) (3)
- Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses (2022) (2)
- Multi-protocol Attacks (2012) (2)
- Limiting the impact of unreliable randomness in deployed security protocols (2020) (2)
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (2013) (2)
- CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs (2022) (1)
- ASICS: authenticated key exchange security incorporating certification systems (2016) (1)
- Subterm-based proof techniques for improving the automation and scope of security protocol analysis (2022) (1)
- Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols (2022) (1)
- Key Exchange in IPsec revisited (2011) (1)
- Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security (2015) (1)
- FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation (2022) (1)
- Chapter 22 Model Checking Security Protocols (2018) (0)
- Historical Background and Further Reading (2012) (0)
- Provably Post-Quantum Secure Messaging with Strong Compromise Resilience and Immediate Decryption (2022) (0)
- Complete Characterization of Security Protocols by Pattern Refinement (2007) (0)
- Session details: Session 2C: Crypto Attacks (2018) (0)
- SAMASC - Security Analysis for Multi-Applet Smart Cards (2002) (0)
- Distance Hijacking Attacks on Distance Bounding Protocols - Abstract (2010) (0)
- Model Checking Security Protocols Draft Manuscript (2012) (0)
- A distance hijacking attack on the CRCS distance bounding protocol (2011) (0)
- C R ] 1 M ay 2 00 7 A framework for compositional veri cation of security protocols (0)
- Preface (2005) (0)
- Security Standardisation Research (2018) (0)
- Proceedings of the First International Workshop on Security and Trust Management (STM'05, Milan, Italy, September 15, 2005; in conjunction with ESORICS'05) (2006) (0)
- A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols (2022) (0)
- Strengthening the security of authenticated key exchange against bad randomness (2017) (0)
- A Holistic Security Analysis of Monero Transactions (2023) (0)
- C R ] 1 9 D ec 2 00 7 On the Protocol Composition Logic PCL ∗ (2009) (0)
- Technical Report No . 572 Scyther : Unbounded Verification of Security Protocols (2007) (0)
- Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations (2022) (0)
- TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation (2022) (0)
- Generalising NSL for Multi-party Authentication (2012) (0)
- 7 S ep 2 00 7 On the Protocol Composition Logic PCL ∗ (2008) (0)
- Scyther; ; Technical report; (2007) (0)
- Formal Analysis of SPDM: Security Protocol and Data Model version 1.2 (2022) (0)
- Security Analysis for Randomness Improvements for Security Protocols (2018) (0)
This paper list is powered by the following services:
Other Resources About Cas Cremers
What Schools Are Affiliated With Cas Cremers?
Cas Cremers is affiliated with the following schools: