Benedikt Schmidt
TitleCited byYear
The TAMARIN prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
International Conference on Computer Aided Verification, 696-701, 2013
2672013
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, DA Basin
Proceedings of the 25rd IEEE Computer Security Foundations Symposium, CSF, 25-27, 2012
1922012
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE Symposium on Security and Privacy, 113-127, 2012
1482012
EasyCrypt: A Tutorial
G Barthe, F Dupressoir, B Grégoire, C Kunz, B Schmidt, PY Strub
Foundations of security analysis and design vii, 146-166, 2013
892013
Modeling and verifying physical properties of security protocols for wireless networks
P Schaller, B Schmidt, D Basin, S Capkun
Computer Security Foundations Symposium, 2009. CSF'09. 22nd IEEE, 109-123, 2009
442009
Jasmin: High-assurance and high-speed cryptography
JB Almeida, M Barbosa, G Barthe, A Blot, B Grégoire, V Laporte, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
412017
Fully automated analysis of padding-based encryption in the computational model
G Barthe, JM Crespo, B Grégoire, C Kunz, Y Lakhnech, B Schmidt, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
412013
Automated analysis of cryptographic assumptions in generic group models
G Barthe, E Fagerholm, D Fiore, J Mitchell, A Scedrov, B Schmidt
Annual Cryptology Conference, 95-112, 2014
392014
Formal Reasoning about Physical Properties of Security Protocols
D Basin, S Capkun, P Schaller, B Schmidt
ACM Transactions on Information and System Security (TISSEC) 14 (2), 16, 2011
362011
Strongly-optimal structure preserving signatures from type II pairings: Synthesis and lower bounds
G Barthe, E Fagerholm, D Fiore, A Scedrov, B Schmidt, M Tibouchi
IET Information Security 10 (6), 358-371, 2016
342016
Automated verification of group key agreement protocols
B Schmidt, R Sasse, C Cremers, D Basin
2014 IEEE Symposium on Security and Privacy, 179-194, 2014
332014
Formal analysis of key exchange protocols and physical protocols
B Schmidt
ETH Zurich, Switzerland, 2012
302012
Let’s get physical: Models and methods for real-world security protocols
D Basin, S Capkun, P Schaller, B Schmidt
Theorem Proving in Higher Order Logics, 1-22, 2009
252009
Key confirmation in key exchange: A formal treatment and implications for TLS 1.3
M Fischlin, F Günther, B Schmidt, B Warinschi
2016 IEEE Symposium on Security and Privacy (SP), 452-469, 2016
222016
Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols
G Barthe, JM Crespo, Y Lakhnech, B Schmidt
Annual International Conference on the Theory and Applications of …, 2015
182015
Machine-checked proofs of privacy for electronic voting protocols
V Cortier, CC Drăgan, F Dupressoir, B Schmidt, PY Strub, B Warinschi
2017 IEEE Symposium on Security and Privacy (SP), 993-1008, 2017
152017
Automated proofs of pairing-based cryptography
G Barthe, B Grégoire, B Schmidt
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
152015
Automated unbounded analysis of cryptographic constructions in the generic group model
M Ambrona, G Barthe, B Schmidt
Annual International Conference on the Theory and Applications of …, 2016
132016
Generic Transformations of Predicate Encodings: Constructions and Applications.
M Ambrona, G Barthe, B Schmidt
International Cryptology Conference, 2016
122016
Certified synthesis of efficient batch verifiers
JA Akinyele, G Barthe, B Grégoire, B Schmidt, PY Strub
2014 IEEE 27th Computer Security Foundations Symposium, 153-165, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20