Christoph Sprenger
Christoph Sprenger
Senior researcher at ETH Zurich
Verified email at
Cited by
Cited by
Cryptographically sound theorem proving
C Sprenger, D Basin, M Backes, B Pfitzmann, M Waidner
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-166, 2006
On the Structure of Inductive Reasoning: Circular and Tree-Shaped Proofs in the žCalculus
C Sprenger, M Dam
International Conference on Foundations of Software Science and Computation†…, 2003
A verified model checker for the modal ž-calculus in Coq
C Sprenger
International Conference on Tools and Algorithms for the Construction and†…, 1998
Cutoff bounds for consensus algorithms
O Marić, C Sprenger, D Basin
International Conference on Computer Aided Verification, 217-237, 2017
Checking absence of illicit applet interactions: a case study
M Huisman, D Gurov, C Sprenger, G Chugunov
International Conference on Fundamental Approaches to Software Engineering†…, 2004
Developing security protocols by refinement
C Sprenger, D Basin
Proceedings of the 17th ACM conference on Computer and communications†…, 2010
Compositional verification of sequential programs with procedures
D Gurov, M Huisman, C Sprenger
Information and Computation 206 (7), 840-868, 2008
Sciddle: A tool for large scale distributed computing
P Arbenz, C Sprenger, HP Luthi, S Vogel
Concurrency: Practice and Experience 7 (2), 121-146, 1995
Refining key establishment
C Sprenger, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 230-246, 2012
On global induction mechanisms in a ž-calculus with explicit approximations
C Sprenger, M Dam
RAIRO-Theoretical Informatics and Applications 37 (4), 365-391, 2003
Deductive local model checking -- On the verification of CTL* properties of infinite-state reactive systems
C Sprenger
PhD thesis, EPFL, 2000
Cryptographically-sound protocol-model abstractions
C Sprenger, D Basin
2008 21st IEEE Computer Security Foundations Symposium, 115-129, 2008
Compositional verification for secure loading of smart card applets
C Sprenger, D Gurov, M Huisman
Proceedings. Second ACM and IEEE International Conference on Formal Methods†…, 2004
Simulation logic, applets and compositional verification
C Sprenger, D Gurov, M Huisman
INRIA, 2003
A parallel implementation of the symmetric tridiagonal QR algorithm
P Arbenz, K Gates, C Sprenger
[Proceedings 1992] The Fourth Symposium on the Frontiers of Massively†…, 1992
A monad-based modeling and verification toolbox with application to security protocols
C Sprenger, D Basin
International Conference on Theorem Proving in Higher Order Logics, 302-318, 2007
Refining security protocols
C Sprenger, D Basin
Journal of Computer Security 26 (1), 71-120, 2018
Verification of a transactional memory manager under hardware failures and restarts
O Marić, C Sprenger
International Symposium on Formal Methods, 449-464, 2014
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust
L Chuat, AR Abdou, R Sasse, C Sprenger, D Basin, A Perrig
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 624-638, 2020
Refining authenticated key agreement with strong adversaries
J Lallemand, D Basin, C Sprenger
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 92-107, 2017
The system can't perform the operation now. Try again later.
Articles 1–20