Follow
Christoph Sprenger
Christoph Sprenger
Senior researcher at ETH Zurich
Verified email at inf.ethz.ch
Title
Cited by
Cited by
Year
On the Structure of Inductive Reasoning: Circular and Tree-Shaped Proofs in the μCalculus
C Sprenger, M Dam
International Conference on Foundations of Software Science and Computation …, 2003
1092003
Cryptographically sound theorem proving
C Sprenger, D Basin, M Backes, B Pfitzmann, M Waidner
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-166, 2006
1002006
A verified model checker for the modal μ-calculus in Coq
C Sprenger
International Conference on Tools and Algorithms for the Construction and …, 1998
691998
Cutoff bounds for consensus algorithms
O Marić, C Sprenger, D Basin
Computer Aided Verification: 29th International Conference, CAV 2017 …, 2017
632017
{EPIC}: every packet is checked in the data plane of a {Path-Aware} Internet
M Legner, T Klenze, M Wyss, C Sprenger, A Perrig
29th USENIX Security Symposium (USENIX Security 20), 541-558, 2020
422020
Developing security protocols by refinement
C Sprenger, D Basin
Proceedings of the 17th ACM conference on Computer and communications …, 2010
392010
Checking absence of illicit applet interactions: a case study
M Huisman, D Gurov, C Sprenger, G Chugunov
Fundamental Approaches to Software Engineering: 7th International Conference …, 2004
372004
Compositional verification of sequential programs with procedures
D Gurov, M Huisman, C Sprenger
Information and Computation 206 (7), 840-868, 2008
322008
Igloo: Soundly linking compositional refinement and separation logic for distributed system verification
C Sprenger, T Klenze, M Eilers, FA Wolf, P Müller, M Clochard, D Basin
Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-31, 2020
292020
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust
L Chuat, AR Abdou, R Sasse, C Sprenger, D Basin, A Perrig
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 624-638, 2020
292020
On global induction mechanisms in a μ-calculus with explicit approximations
C Sprenger, M Dam
RAIRO-Theoretical Informatics and Applications 37 (4), 365-391, 2003
292003
Refining key establishment
C Sprenger, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 230-246, 2012
262012
Sciddle: A tool for large scale distributed computing
P Arbenz, C Sprenger, HP Luthi, S Vogel
Concurrency: Practice and Experience 7 (2), 121-146, 1995
241995
Refining security protocols
C Sprenger, D Basin
Journal of Computer Security 26 (1), 71-120, 2018
182018
Deductive local model checking -- On the verification of CTL* properties of infinite-state reactive systems
C Sprenger
PhD thesis, EPFL, 2000
16*2000
Cryptographically-sound protocol-model abstractions
C Sprenger, D Basin
2008 21st IEEE Computer Security Foundations Symposium, 115-129, 2008
152008
A monad-based modeling and verification toolbox with application to security protocols
C Sprenger, D Basin
International Conference on Theorem Proving in Higher Order Logics, 302-318, 2007
152007
Compositional verification for secure loading of smart card applets
C Sprenger, D Gurov, M Huisman
Proceedings. Second ACM and IEEE International Conference on Formal Methods …, 2004
142004
Simulation logic, applets and compositional verification
C Sprenger, D Gurov, M Huisman
INRIA, 2003
142003
A parallel implementation of the symmetric tridiagonal QR algorithm
P Arbenz, K Gates, C Sprenger
[Proceedings 1992] The Fourth Symposium on the Frontiers of Massively …, 1992
141992
The system can't perform the operation now. Try again later.
Articles 1–20