default search action
Christoph Sprenger 0001
Person information
- affiliation: ETH Zurich, Switzerland
- affiliation (2002 - 2003): INRIA Sophia Antipolis, France
- affiliation (2001 - 2002): Swedish Institute of Computer Science (SICS), Stockholm, Sweden
- affiliation (PhD 2000): EPF Lausanne, Switzerland
Other persons with the same name
- Christoph Sprenger 0002 — CA Scanline Production GmbH
- Christoph Sprenger 0003 — Weta Digital, New Zealand
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Azucena Garvía Bosshard, Christoph Sprenger, Jonathan Bootle:
The Sumcheck Protocol. Arch. Formal Proofs 2024 (2024) - [c24]Azucena Garvía Bosshard, Jonathan Bootle, Christoph Sprenger:
Formal Verification of the Sumcheck Protocol. CSF 2024: 605-619 - [i6]Azucena Garvía Bosshard, Jonathan Bootle, Christoph Sprenger:
Formal Verification of the Sumcheck Protocol. CoRR abs/2402.06093 (2024) - [i5]João C. Pereira, Tobias Klenze, Sofia Giampietro, Markus Limbeck, Dionysios Spiliopoulos, Felix A. Wolf, Marco Eilers, Christoph Sprenger, David A. Basin, Peter Müller, Adrian Perrig:
Protocols to Code: Formal Verification of a Next-Generation Internet Router. CoRR abs/2405.06074 (2024) - 2023
- [j11]Tobias Klenze, Christoph Sprenger, David A. Basin:
IsaNet: A framework for verifying secure data plane protocols. J. Comput. Secur. 31(3): 217-259 (2023) - [c23]Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations. SP 2023: 1077-1093 - 2022
- [j10]Tobias Klenze, Christoph Sprenger:
IsaNet: Formalization of a Verification Framework for Secure Data Plane Protocols. Arch. Formal Proofs 2022 (2022) - [c22]Thilo Weghorn, Si Liu, Christoph Sprenger, Adrian Perrig, David A. Basin:
N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures. CSF 2022: 147-162 - [d3]Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations. Version v1.0.0. Zenodo, 2022 [all versions] - [d2]Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations. Version v1.0.0. Zenodo, 2022 [all versions] - [i4]Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version). CoRR abs/2212.04171 (2022) - 2021
- [c21]Tobias Klenze, Christoph Sprenger, David A. Basin:
Formal Verification of Secure Forwarding Protocols. CSF 2021: 1-16 - [d1]Tobias Klenze, Christoph Sprenger, David A. Basin:
Formal Verification of Secure Forwarding Protocols (Artifact). Zenodo, 2021 - 2020
- [j9]Christoph Sprenger, Tobias Klenze, Marco Eilers, Felix A. Wolf, Peter Müller, Martin Clochard, David A. Basin:
Igloo: soundly linking compositional refinement and separation logic for distributed system verification. Proc. ACM Program. Lang. 4(OOPSLA): 152:1-152:31 (2020) - [c20]Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David A. Basin, Adrian Perrig:
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust. EuroS&P 2020: 624-638 - [c19]Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, Adrian Perrig:
EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet. USENIX Security Symposium 2020: 541-558 - [i3]Christoph Sprenger, Tobias Klenze, Marco Eilers, Felix A. Wolf, Peter Müller, Martin Clochard, David A. Basin:
Igloo: Soundly Linking Compositional Refinement and Separation Logic for Distributed System Verification. CoRR abs/2010.04749 (2020)
2010 – 2019
- 2019
- [i2]Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David A. Basin, Adrian Perrig:
Proxy Certificates: The Missing Link in the Web's Chain of Trust. CoRR abs/1906.10775 (2019) - 2018
- [j8]Christoph Sprenger, David A. Basin:
Refining security protocols. J. Comput. Secur. 26(1): 71-120 (2018) - [j7]Thanh Binh Nguyen, Christoph Sprenger, Cas Cremers:
Abstractions for security protocol verification. J. Comput. Secur. 26(4): 459-508 (2018) - 2017
- [j6]Joseph Lallemand, Christoph Sprenger:
Refining Authenticated Key Agreement with Strong Adversaries. Arch. Formal Proofs 2017 (2017) - [j5]Christoph Sprenger, Ivano Somaini:
Developing Security Protocols by Refinement. Arch. Formal Proofs 2017 (2017) - [c18]Ognjen Maric, Christoph Sprenger, David A. Basin:
Cutoff Bounds for Consensus Algorithms. CAV (2) 2017: 217-237 - [c17]Joseph Lallemand, David A. Basin, Christoph Sprenger:
Refining Authenticated Key Agreement with Strong Adversaries. EuroS&P 2017: 92-107 - 2015
- [j4]Ognjen Maric, Christoph Sprenger:
Consensus Refined. Arch. Formal Proofs 2015 (2015) - [c16]Ognjen Maric, Christoph Sprenger, David A. Basin:
Consensus Refined. DSN 2015: 391-402 - [c15]Thanh Binh Nguyen, Christoph Sprenger:
Abstractions for Security Protocol Verification. POST 2015: 196-215 - 2014
- [c14]Ognjen Maric, Christoph Sprenger:
Verification of a Transactional Memory Manager under Hardware Failures and Restarts. FM 2014: 449-464 - 2013
- [c13]Thanh Binh Nguyen, Christoph Sprenger:
Sound Security Protocol Transformations. POST 2013: 83-104 - 2012
- [c12]Christoph Sprenger, David A. Basin:
Refining Key Establishment. CSF 2012: 230-246 - 2010
- [c11]Christoph Sprenger, David A. Basin:
Developing security protocols by refinement. CCS 2010: 361-374
2000 – 2009
- 2008
- [j3]Dilian Gurov, Marieke Huisman, Christoph Sprenger:
Compositional verification of sequential programs with procedures. Inf. Comput. 206(7): 840-868 (2008) - [c10]Christoph Sprenger, David A. Basin:
Cryptographically-Sound Protocol-Model Abstractions. CSF 2008: 115-129 - 2007
- [c9]Christoph Sprenger, David A. Basin:
A Monad-Based Modeling and Verification Toolbox with Application to Security Protocols. TPHOLs 2007: 302-318 - 2006
- [c8]Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. CSFW 2006: 153-166 - [i1]Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. IACR Cryptol. ePrint Arch. 2006: 47 (2006) - 2004
- [c7]Marieke Huisman, Dilian Gurov, Christoph Sprenger, Gennady Chugunov:
Checking Absence of Illicit Applet Interactions: A Case Study. FASE 2004: 84-98 - [c6]Christoph Sprenger, Dilian Gurov, Marieke Huisman:
Compositional verification for secure loading of smart card applets. MEMOCODE 2004: 211-222 - 2003
- [j2]Christoph Sprenger, Mads Dam:
On global induction mechanisms in a µ-calculus with explicit approximations. RAIRO Theor. Informatics Appl. 37(4): 365-391 (2003) - [c5]Christoph Sprenger, Mads Dam:
On the Structure of Inductive Reasoning: Circular and Tree-Shaped Proofs in the µ-Calculus. FoSSaCS 2003: 425-440 - [c4]Christoph Sprenger, Krzysztof Worytkiewicz:
A Verification Methodology for Infinite-State Message Passing Systems. MEMOCODE 2003: 255-264 - 2002
- [c3]Christoph Sprenger, Mads Dam:
A note on global induction in a mu-calculus with explicit approximations. FICS 2002: 22-24
1990 – 1999
- 1998
- [c2]Christoph Sprenger:
A Verified Model Checker for the Modal µ-calculus in Coq. TACAS 1998: 167-183 - 1995
- [j1]Peter Arbenz, Christoph Sprenger, Hans Peter Lüthi, Stefan Vogel:
SCIDDLE: A tool for large scale distributed computing. Concurr. Pract. Exp. 7(2): 121-146 (1995) - 1994
- [c1]Peter Arbenz, Hans Peter Lüthi, Christoph Sprenger, Stefan Vogel:
SCIDDLE: A Tool for Large Scale Cooperative Computing. HPCN 1994: 326-327
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint