Christoph Sprenger
Christoph Sprenger
Senior researcher at ETH Zurich
Verified email at
Cited by
Cited by
On the Structure of Inductive Reasoning: Circular and Tree-Shaped Proofs in the μCalculus
C Sprenger, M Dam
International Conference on Foundations of Software Science and Computation …, 2003
Cryptographically sound theorem proving
C Sprenger, D Basin, M Backes, B Pfitzmann, M Waidner
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-166, 2006
A verified model checker for the modal μ-calculus in Coq
C Sprenger
International Conference on Tools and Algorithms for the Construction and …, 1998
Cutoff bounds for consensus algorithms
O Marić, C Sprenger, D Basin
Computer Aided Verification: 29th International Conference, CAV 2017 …, 2017
{EPIC}: every packet is checked in the data plane of a {Path-Aware} Internet
M Legner, T Klenze, M Wyss, C Sprenger, A Perrig
29th USENIX Security Symposium (USENIX Security 20), 541-558, 2020
Developing security protocols by refinement
C Sprenger, D Basin
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Checking absence of illicit applet interactions: a case study
M Huisman, D Gurov, C Sprenger, G Chugunov
Fundamental Approaches to Software Engineering: 7th International Conference …, 2004
Igloo: soundly linking compositional refinement and separation logic for distributed system verification
C Sprenger, T Klenze, M Eilers, FA Wolf, P Müller, M Clochard, D Basin
Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-31, 2020
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust
L Chuat, AR Abdou, R Sasse, C Sprenger, D Basin, A Perrig
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 624-638, 2020
On global induction mechanisms in a μ-calculus with explicit approximations
C Sprenger, M Dam
RAIRO-Theoretical Informatics and Applications 37 (4), 365-391, 2003
Compositional verification of sequential programs with procedures
D Gurov, M Huisman, C Sprenger
Information and Computation 206 (7), 840-868, 2008
Refining key establishment
C Sprenger, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 230-246, 2012
Sciddle: A tool for large scale distributed computing
P Arbenz, C Sprenger, HP Luthi, S Vogel
Concurrency: Practice and Experience 7 (2), 121-146, 1995
Refining security protocols
C Sprenger, D Basin
Journal of Computer Security 26 (1), 71-120, 2018
Deductive local model checking -- On the verification of CTL* properties of infinite-state reactive systems
C Sprenger
PhD thesis, EPFL, 2000
Cryptographically-sound protocol-model abstractions
C Sprenger, D Basin
2008 21st IEEE Computer Security Foundations Symposium, 115-129, 2008
A monad-based modeling and verification toolbox with application to security protocols
C Sprenger, D Basin
International Conference on Theorem Proving in Higher Order Logics, 302-318, 2007
Formal verification of secure forwarding protocols
T Klenze, C Sprenger, D Basin
2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021
Consensus refined
O Maric, C Sprenger, D Basin
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
Compositional verification for secure loading of smart card applets
C Sprenger, D Gurov, M Huisman
Proceedings. Second ACM and IEEE International Conference on Formal Methods …, 2004
The system can't perform the operation now. Try again later.
Articles 1–20