Follow
Benedikt Schmidt
Title
Cited by
Cited by
Year
The TAMARIN prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
International conference on computer aided verification, 696-701, 2013
6112013
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, DA Basin
Proceedings of the 25rd IEEE Computer Security Foundations Symposium, CSF, 25-27, 2012
2842012
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE symposium on security and privacy, 113-127, 2012
2012012
EasyCrypt: A Tutorial
G Barthe, F Dupressoir, B Grégoire, C Kunz, B Schmidt, PY Strub
Foundations of security analysis and design vii, 146-166, 2013
1652013
Jasmin: High-assurance and high-speed cryptography
JB Almeida, M Barbosa, G Barthe, A Blot, B Grégoire, V Laporte, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1152017
Automated verification of group key agreement protocols
B Schmidt, R Sasse, C Cremers, D Basin
2014 IEEE Symposium on Security and Privacy, 179-194, 2014
562014
Automated analysis of cryptographic assumptions in generic group models
G Barthe, E Fagerholm, D Fiore, J Mitchell, A Scedrov, B Schmidt
Annual Cryptology Conference, 95-112, 2014
532014
Fully automated analysis of padding-based encryption in the computational model
G Barthe, JM Crespo, B Grégoire, C Kunz, Y Lakhnech, B Schmidt, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
512013
Modeling and verifying physical properties of security protocols for wireless networks
P Schaller, B Schmidt, D Basin, S Capkun
Computer Security Foundations Symposium, 2009. CSF'09. 22nd IEEE, 109-123, 2009
502009
Formal analysis of key exchange protocols and physical protocols
B Schmidt
ETH Zurich, Switzerland, 2012
492012
Key confirmation in key exchange: A formal treatment and implications for TLS 1.3
M Fischlin, F Günther, B Schmidt, B Warinschi
2016 IEEE Symposium on Security and Privacy (SP), 452-469, 2016
482016
Formal Reasoning about Physical Properties of Security Protocols
D Basin, S Capkun, P Schaller, B Schmidt
ACM Transactions on Information and System Security (TISSEC) 14 (2), 16, 2011
462011
Strongly‐optimal structure preserving signatures from Type II pairings: synthesis and lower bounds
G Barthe, E Fagerholm, D Fiore, A Scedrov, B Schmidt, M Tibouchi
IET Information Security 10 (6), 358-371, 2016
392016
Machine-checked proofs of privacy for electronic voting protocols
V Cortier, CC Drăgan, F Dupressoir, B Schmidt, PY Strub, B Warinschi
2017 IEEE Symposium on Security and Privacy (SP), 993-1008, 2017
332017
Let’s get physical: Models and methods for real-world security protocols
D Basin, S Capkun, P Schaller, B Schmidt
Theorem Proving in Higher Order Logics, 1-22, 2009
332009
Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols
G Barthe, JM Crespo, Y Lakhnech, B Schmidt
Annual International Conference on the Theory and Applications of …, 2015
292015
Generic Transformations of Predicate Encodings: Constructions and Applications.
M Ambrona, G Barthe, B Schmidt
International Cryptology Conference, 2016
242016
Automated proofs of pairing-based cryptography
G Barthe, B Grégoire, B Schmidt
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
242015
Automated unbounded analysis of cryptographic constructions in the generic group model
M Ambrona, G Barthe, B Schmidt
Annual International Conference on the Theory and Applications of …, 2016
212016
Impossibility results for secret establishment
B Schmidt, P Schaller, D Basin
2010 23rd IEEE Computer Security Foundations Symposium, 261-273, 2010
102010
The system can't perform the operation now. Try again later.
Articles 1–20