Benedikt Schmidt
Benedikt Schmidt
Verified email at - Homepage
Cited by
Cited by
The TAMARIN prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
Computer Aided Verification: 25th International Conference, CAV 2013, Saint …, 2013
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, DA Basin
Proceedings of the 25rd IEEE Computer Security Foundations Symposium, CSF, 25-27, 2012
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE symposium on security and privacy, 113-127, 2012
Easycrypt: A tutorial
G Barthe, F Dupressoir, B Grégoire, C Kunz, B Schmidt, PY Strub
International School on Foundations of Security Analysis and Design, 146-166, 2012
Jasmin: High-assurance and high-speed cryptography
JB Almeida, M Barbosa, G Barthe, A Blot, B Grégoire, V Laporte, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Key confirmation in key exchange: A formal treatment and implications for TLS 1.3
M Fischlin, F Günther, B Schmidt, B Warinschi
2016 IEEE Symposium on Security and Privacy (SP), 452-469, 2016
Automated verification of group key agreement protocols
B Schmidt, R Sasse, C Cremers, D Basin
2014 IEEE Symposium on Security and Privacy, 179-194, 2014
Automated analysis of cryptographic assumptions in generic group models
G Barthe, E Fagerholm, D Fiore, J Mitchell, A Scedrov, B Schmidt
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
Fully automated analysis of padding-based encryption in the computational model
G Barthe, JM Crespo, B Grégoire, C Kunz, Y Lakhnech, B Schmidt, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Formal analysis of key exchange protocols and physical protocols
B Schmidt
ETH Zurich, Switzerland, 2012
Modeling and verifying physical properties of security protocols for wireless networks
P Schaller, B Schmidt, D Basin, S Capkun
Computer Security Foundations Symposium, 2009. CSF'09. 22nd IEEE, 109-123, 2009
Machine-checked proofs of privacy for electronic voting protocols
V Cortier, CC Drăgan, F Dupressoir, B Schmidt, PY Strub, B Warinschi
2017 IEEE Symposium on Security and Privacy (SP), 993-1008, 2017
Formal Reasoning about Physical Properties of Security Protocols
D Basin, S Capkun, P Schaller, B Schmidt
ACM Transactions on Information and System Security (TISSEC) 14 (2), 16, 2011
Strongly‐optimal structure preserving signatures from Type II pairings: synthesis and lower bounds
G Barthe, E Fagerholm, D Fiore, A Scedrov, B Schmidt, M Tibouchi
IET Information Security 10 (6), 358-371, 2016
Generic Transformations of Predicate Encodings: Constructions and Applications.
M Ambrona, G Barthe, B Schmidt
International Cryptology Conference, 2016
Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols
G Barthe, JM Crespo, Y Lakhnech, B Schmidt
Annual International Conference on the Theory and Applications of …, 2015
Let’s get physical: Models and methods for real-world security protocols
D Basin, S Capkun, P Schaller, B Schmidt
Theorem Proving in Higher Order Logics, 1-22, 2009
Automated proofs of pairing-based cryptography
G Barthe, B Grégoire, B Schmidt
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Automated unbounded analysis of cryptographic constructions in the generic group model
M Ambrona, G Barthe, B Schmidt
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
Impossibility results for secret establishment
B Schmidt, P Schaller, D Basin
2010 23rd IEEE Computer Security Foundations Symposium, 261-273, 2010
The system can't perform the operation now. Try again later.
Articles 1–20