His primary scientific interests are in Computer security, Cryptographic protocol, Computer security model, Protocol and Protocol. His work on Cryptography as part of general Computer security research is often related to Relation, thus linking different fields of science. The various areas that Cas Cremers examines in his Cryptography study include Bounding overwatch and Resilience.
He interconnects Correctness, Theoretical computer science and Authentication in the investigation of issues within Cryptographic protocol. His Computer security model research incorporates elements of Authenticated Key Exchange, Key exchange, Public-key cryptography and Security service. His Protocol research incorporates elements of Set and State.
Cas Cremers mainly focuses on Computer security, Cryptographic protocol, Computer security model, Theoretical computer science and Cryptography. As part of one scientific family, Cas Cremers deals mainly with the area of Computer security, narrowing it down to issues related to the Protocol, and often State. His studies in Cryptographic protocol integrate themes in fields like Correctness, Isolation, Adversary model, Authentication and Formal verification.
The Computer security model study combines topics in areas such as Authenticated Key Exchange, Security service, Certificate authority and Scope. His Theoretical computer science research includes themes of Property, Mathematical proof, Operational semantics and Set. His Cryptography research is multidisciplinary, incorporating elements of Security analysis, Secrecy and Coding theory.
Cas Cremers focuses on Computer security, Cryptographic protocol, Cryptography, Protocol and Key exchange. His work on Data Protection Act 1998 is typically connected to Compromise as part of general Computer security study, connecting several disciplines of science. His work deals with themes such as Formal verification, Server and Hardware security module, which intersect with Cryptographic protocol.
His Cryptography course of study focuses on Security analysis and Computer security model, Authenticated Key Exchange, Encryption, Secrecy and Session. His Protocol research spans across into subjects like Symbolic data analysis, Protocol analysis, Diffie–Hellman key exchange, Gas meter prover and Theoretical computer science. While the research belongs to areas of Symbolic data analysis, he spends his time largely on the problem of Public-key cryptography, intersecting his research to questions surrounding Digital signature and Signature.
His primary areas of investigation include Computer security, Data Protection Act 1998, Upload, Tracing and Protocol. His study in Computer security concentrates on Cryptographic protocol and Public-key cryptography. He has researched Cryptographic protocol in several fields, including Signature, Symbolic data analysis and Digital signature.
His Data Protection Act 1998 research incorporates themes from Process, Identity and Privacy preserving. He combines subjects such as Identifier, Interoperability and Beacon with his study of Upload. He has included themes like Security analysis, Isolation, Gas meter prover and Authentication in his Protocol study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
Cas J. Cremers.
computer aided verification (2008)
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
Cas J. Cremers.
computer aided verification (2008)
The TAMARIN prover for the symbolic analysis of security protocols
Simon Meier;Benedikt Schmidt;Cas Cremers;David Basin.
computer aided verification (2013)
The TAMARIN prover for the symbolic analysis of security protocols
Simon Meier;Benedikt Schmidt;Cas Cremers;David Basin.
computer aided verification (2013)
A Formal Security Analysis of the Signal Messaging Protocol
Katriel Cohn-Gordon;Cas Cremers;Benjamin Dowling;Luke Garratt.
Journal of Cryptology (2020)
A Formal Security Analysis of the Signal Messaging Protocol
Katriel Cohn-Gordon;Cas Cremers;Benjamin Dowling;Luke Garratt.
Journal of Cryptology (2020)
Scyther : semantics and verification of security protocols
Cjf Cas Cremers.
(2006)
Scyther : semantics and verification of security protocols
Cjf Cas Cremers.
(2006)
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
B. Schmidt;S. Meier;C. Cremers;D. Basin.
ieee computer security foundations symposium (2012)
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
B. Schmidt;S. Meier;C. Cremers;D. Basin.
ieee computer security foundations symposium (2012)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
ETH Zurich
University of Luxembourg
University of Waterloo
ETH Zurich
University of Birmingham
ETH Zurich
French Institute for Research in Computer Science and Automation - INRIA
Carnegie Mellon University
Technical University of Darmstadt
French Institute for Research in Computer Science and Automation - INRIA
French Institute for Research in Computer Science and Automation - INRIA
Publications: 14
French Institute for Research in Computer Science and Automation - INRIA
Publications: 11
Brigham Young University
Chinese Academy of Sciences
National Institutes of Health
University of Washington
Chuo University
UK Centre for Ecology & Hydrology
University of Calgary
University of California, Santa Barbara
University of Bern
Scripps Institution of Oceanography
Hokkaido University
National Oceanic and Atmospheric Administration
Max Planck Society
Université Paris Cité
University of Washington
Stanford University