Christoph Sprenger
Christoph Sprenger
Senior researcher at ETH Zurich
Verified email at
Cited by
Cited by
Cryptographically sound theorem proving
C Sprenger, D Basin, M Backes, B Pfitzmann, M Waidner
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-166, 2006
On the Structure of Inductive Reasoning: Circular and Tree-Shaped Proofs in the μCalculus
C Sprenger, M Dam
International Conference on Foundations of Software Science and Computation …, 2003
A verified model checker for the modal μ-calculus in Coq
C Sprenger
International Conference on Tools and Algorithms for the Construction and …, 1998
Cutoff bounds for consensus algorithms
O Marić, C Sprenger, D Basin
International Conference on Computer Aided Verification, 217-237, 2017
Checking absence of illicit applet interactions: a case study
M Huisman, D Gurov, C Sprenger, G Chugunov
International Conference on Fundamental Approaches to Software Engineering …, 2004
Developing security protocols by refinement
C Sprenger, D Basin
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Compositional verification of sequential programs with procedures
D Gurov, M Huisman, C Sprenger
Information and Computation 206 (7), 840-868, 2008
Sciddle: A tool for large scale distributed computing
P Arbenz, C Sprenger, HP Luthi, S Vogel
Concurrency: Practice and Experience 7 (2), 121-146, 1995
Refining key establishment
C Sprenger, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 230-246, 2012
On global induction mechanisms in a μ-calculus with explicit approximations
C Sprenger, M Dam
RAIRO-Theoretical Informatics and Applications 37 (4), 365-391, 2003
Deductive local model checking -- On the verification of CTL* properties of infinite-state reactive systems
C Sprenger
PhD thesis, EPFL, 2000
Cryptographically-sound protocol-model abstractions
C Sprenger, D Basin
2008 21st IEEE Computer Security Foundations Symposium, 115-129, 2008
Compositional verification for secure loading of smart card applets
C Sprenger, D Gurov, M Huisman
Proceedings. Second ACM and IEEE International Conference on Formal Methods …, 2004
Simulation logic, applets and compositional verification
C Sprenger, D Gurov, M Huisman
INRIA, 2003
A parallel implementation of the symmetric tridiagonal QR algorithm
P Arbenz, K Gates, C Sprenger
[Proceedings 1992] The Fourth Symposium on the Frontiers of Massively …, 1992
Refining security protocols
C Sprenger, D Basin
Journal of Computer Security 26 (1), 71-120, 2018
A monad-based modeling and verification toolbox with application to security protocols
C Sprenger, D Basin
International Conference on Theorem Proving in Higher Order Logics, 302-318, 2007
Verification of a transactional memory manager under hardware failures and restarts
O Marić, C Sprenger
International Symposium on Formal Methods, 449-464, 2014
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust
L Chuat, AR Abdou, R Sasse, C Sprenger, D Basin, A Perrig
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 624-638, 2020
Refining authenticated key agreement with strong adversaries
J Lallemand, D Basin, C Sprenger
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 92-107, 2017
The system can't perform the operation now. Try again later.
Articles 1–20