Accéder directement au contenu

Jannik Dreier

52
Documents

Publications

Image document

Optimal Threshold Padlock Systems

Jannik Dreier , Jean-Guillaume Dumas , Pascal Lafourcade , Léo Robert
Journal of Computer Security, 2022, 30 (5), pp.655-688. ⟨10.3233/JCS-210065⟩
Article dans une revue hal-03497369v3
Image document

Automatic generation of sources lemmas in TAMARIN: towards automatic proofs of security protocols

Véronique Cortier , Stéphanie Delaune , Jannik Dreier , Elise Klein
Journal of Computer Security, 2022, 30 (4), pp.573-598. ⟨10.3233/JCS-210053⟩
Article dans une revue hal-03767104v1
Image document

Tamarin: Verification of Large-Scale, Real World, Cryptographic Protocols

David Basin , Cas Cremers , Jannik Dreier , Ralf Sasse
IEEE Security and Privacy Magazine, In press, ⟨10.1109/msec.2022.3154689⟩
Article dans une revue hal-03586826v1
Image document

Verification of Stateful Cryptographic Protocols with Exclusive OR

Jannik Dreier , Lucca Hirschi , Saša Radomirović , Ralf Sasse
Journal of Computer Security, 2020, 28 (1), pp.1--34. ⟨10.3233/JCS-191358⟩
Article dans une revue hal-02358878v1
Image document

A Faster Cryptographer's Conspiracy Santa

Xavier Bultel , Jannik Dreier , Jean-Guillaume Dumas , Pascal Lafourcade
Theoretical Computer Science, 2020, 839, pp.122-134. ⟨10.1016/j.tcs.2020.05.034⟩
Article dans une revue hal-02611751v1
Image document

Security Issues in the 5G Standard and How Formal Methods Come to the Rescue

Lucca Hirschi , Ralf Sasse , Jannik Dreier
ERCIM News, 2019
Article dans une revue hal-02268822v1
Image document

Formally and Practically Verifying Flow Integrity Properties in Industrial Systems

Jannik Dreier , Maxime Puys , Marie-Laure Potet , Pascal Lafourcade , Jean-Louis Roch
Computers and Security, 2018, 86, pp.453-470. ⟨10.1016/j.cose.2018.09.018⟩
Article dans une revue hal-01959766v2
Image document

Symbolically Analyzing Security Protocols using Tamarin

David Basin , Cas Cremers , Jannik Dreier , Ralf Sasse
ACM SIGLOG News, 2017, ⟨10.1145/3157831.3157835⟩
Article dans une revue hal-01622110v1
Image document

How to Explain Modern Security Concepts to your Children

Xavier Bultel , Jannik Dreier , Pascal Lafourcade , Malika More
Cryptologia, 2017, 41 (5), ⟨10.1080/01611194.2016.1238422⟩
Article dans une revue hal-01397035v1
Image document

On the existence and decidability of unique decompositions of processes in the applied π-calculus

Jannik Dreier , Cristian Ene , Pascal Lafourcade , Yassine Lakhnech
Theoretical Computer Science, 2016, 612, pp.102--125. ⟨10.1016/j.tcs.2015.11.033⟩
Article dans une revue hal-01238097v2
Image document

Formal Security Analysis of Traditional and Electronic Exams

Jannik Dreier , Rosario Giustolisi , Ali Kassem , Pascal Lafourcade , Gabriele Lenzini
Communications in Computer and Information Science, 2015, ⟨10.1007/978-3-319-25915-4_16⟩
Article dans une revue hal-01337412v1
Image document

Brandt's fully private auction protocol revisited

Jannik Dreier , Jean-Guillaume Dumas , Pascal Lafourcade
Journal of Computer Security, 2015, Special issue on security and high performance computing systems, 23 (5), pp.587-610. ⟨10.3233/JCS-150535⟩
Article dans une revue hal-01233555v1
Image document

Themis: an On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability

Mikaël Bougon , Hervé Chabanne , Véronique Cortier , Alexandre Debant , Emmanuelle Dottax
CCS 2022 - The ACM Conference on Computer and Communications Security, Nov 2022, Los Angeles, United States. ⟨10.1145/3548606.3560563⟩
Communication dans un congrès hal-03763294v2
Image document

Verifying Table-Based Elections

David Basin , Jannik Dreier , Sofia Giampietro , Saša Radomirović
CCS 2021 - ACM SIGSAC Conference on Computer and Communications Security, Nov 2021, Virtual Event, South Korea. pp.2632-2652, ⟨10.1145/3460120.3484555⟩
Communication dans un congrès hal-03455459v1
Image document

Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols

Véronique Cortier , Stéphanie Delaune , Jannik Dreier
ESORICS 2020 - 25th European Symposium on Research in Computer Security, Sep 2020, Guilford, United Kingdom. pp.3--22, ⟨10.1007/978-3-030-59013-0_1⟩
Communication dans un congrès hal-02903620v1
Image document

Security Analysis and Psychological Study of Authentication Methods with PIN Codes

Xavier Bultel , Jannik Dreier , Matthieu Giraud , Marie Izaute , Timothée Kheyrkhah
RCIS 2018 - IEEE 12th International Conference on Research Challenges in Information Science, May 2018, Nantes, France. pp.1--11, ⟨10.1109/RCIS.2018.8406648⟩
Communication dans un congrès hal-01777898v1
Image document

Physical Zero-Knowledge Proof for Makaro

Xavier Bultel , Jannik Dreier , Jean-Guillaume Dumas , Pascal Lafourcade , Daiki Miyahara
SSS 2018 - 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Nov 2018, Tokyo, Japan. pp.111-125, ⟨10.1007/978-3-030-03232-6_8⟩
Communication dans un congrès hal-01898048v1
Image document

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR

Jannik Dreier , Lucca Hirschi , Sasa Radomirovic , Ralf Sasse
CSF'2018 - 31st IEEE Computer Security Foundations Symposium, Jul 2018, Oxford, United Kingdom. ⟨10.1109/CSF.2018.00033⟩
Communication dans un congrès hal-01780603v1
Image document

A Formal Analysis of 5G Authentication

David Basin , Jannik Dreier , Lucca Hirschi , Saša Radomirovic , Ralf Sasse
ACM CCS 2018 - 25th ACM Conference on Computer and Communications Security, Oct 2018, Toronto, Canada. ⟨10.1145/3243734.3243846⟩
Communication dans un congrès hal-01898050v1
Image document

A Cryptographer's Conspiracy Santa

Xavier Bultel , Jannik Dreier , Jean-Guillaume Dumas , Pascal Lafourcade
FUN 2018 - 9th International Conference on Fun with Algorithms, Jun 2018, La Maddalena, Italy. pp.13:1--13:13, ⟨10.4230/LIPIcs.FUN.2018.13⟩
Communication dans un congrès hal-01777997v2
Image document

Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols (extended version)

Jannik Dreier , Charles Duménil , Steve Kremer , Ralf Sasse
POST 2017 - 6th International Conference on Principles of Security and Trust, Apr 2017, Uppsala, Sweden. pp.117-140, ⟨10.1007/978-3-662-54455-6_6⟩
Communication dans un congrès hal-01430490v2
Image document

A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange

Michael Backes , Jannik Dreier , Steve Kremer , Robert Künnemann
2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Apr 2017, Paris, France. ⟨10.1109/EuroSP.2017.12⟩
Communication dans un congrès hal-01396282v1
Image document

Formally Verifying Flow Properties in Industrial Systems

Jannik Dreier , Maxime Puys , Marie-Laure Potet , Pascal Lafourcade , Jean-Louis Roch
SECRYPT 2017 - 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.55-66, ⟨10.5220/0006396500550066⟩
Communication dans un congrès hal-01527913v1
Image document

Formal Analysis of Combinations of Secure Protocols

Elliott Blot , Jannik Dreier , Pascal Lafourcade
FPS 2017 - 10th International Symposium on Foundations & Practice of Security, Oct 2017, Nancy, France. pp.53-67, ⟨10.1007/978-3-319-75650-9_4⟩
Communication dans un congrès hal-01596010v2
Image document

Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen

Xavier Bultel , Jannik Dreier , Jean-Guillaume Dumas , Pascal Lafourcade
8th International Conference on Fun with Algorithms, Jun 2016, La Maddalena, Italy. pp.8:1-8:20, ⟨10.4230/LIPIcs.FUN.2016.8⟩
Communication dans un congrès hal-01326059v1
Image document

Automated Symbolic Proofs of Observational Equivalence

David Basin , Jannik Dreier , Ralf Sasse
22nd ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2015), ACM, Oct 2015, Denver, United States. pp.1144--1155, ⟨10.1145/2810103.2813662⟩
Communication dans un congrès hal-01337409v2
Image document

Formal Analysis of E-Cash Protocols

Jannik Dreier , Ali Kassem , Pascal Lafourcade
12th International Conference on Security and Cryptography (SECRYPT 2015), Jul 2015, Colmar, France. ⟨10.5220/0005544500650075⟩
Communication dans un congrès hal-01337410v1
Image document

A Framework for Analyzing Verifiability in Traditional and Electronic Exams

Jannik Dreier , Rosario Giustolisi , Ali Kassem , Pascal Lafourcade , Gabriele Lenzini
Information Security Practice and Experience Conference, May 2015, beijin, China. ⟨10.1007/978-3-319-17533-1_35⟩
Communication dans un congrès hal-01218138v1
Image document

Automated Verification of E-Cash Protocols

Jannik Dreier , Ali Kassem , Pascal Lafourcade
ICETE 2015 - 12th International Joint Conference on e-Business and Telecommunications, Jul 2015, Colmar, France. ⟨10.1007/978-3-319-30222-5_11⟩
Communication dans un congrès hal-01840596v1
Image document

Formal Analysis of Electronic Exams

Jannik Dreier , Rosario Giustolisi , Ali Kassem , Pascal Lafourcade , Gabriele Lenzini
11th International Conference on Security and Cryptography (SECRYPT 2014), Aug 2014, Vienne, Austria. ⟨10.5220/0005050901010112⟩
Communication dans un congrès hal-01337413v1
Image document

Secure Auctions without Cryptography

Jannik Dreier , Hugo Jonker , Pascal Lafourcade
7th International Conference on Fun with Algorithms - FUN 2014, Jul 2014, Lipari, Italy. pp.158-170, ⟨10.1007/978-3-319-07890-8_14⟩
Communication dans un congrès hal-01337414v1

Formal Analysis of Electronic Exams

Jannik Dreier , Rosario Giustolisi , Ali Kassem , Pascal Lafourcade , Gabriele Lenzini
First Symposium on Digital Trust in Auvergne (SDTA'14), Dec 2014, Clermont-Ferrand, France
Communication dans un congrès hal-01338054v1
Image document

On Unique Decomposition of Processes in the Applied π-Calculus

Jannik Dreier , Cristian Ene , Pascal Lafourcade , Yassine Lakhnech
16th International Conference on Foundations of Software Science and Computational Structures (FOSSACS 2013), Held as Part of the European Joint Conferences on Theory and Practice of Software (ETAPS 2013), Mar 2013, Rome, Italy. ⟨10.1007/978-3-642-37075-5_4⟩
Communication dans un congrès hal-01338002v1
Image document

Brandt's Fully Private Auction Protocol Revisited

Jannik Dreier , Jean-Guillaume Dumas , Pascal Lafourcade
Africacrypt 2013, Jun 2013, Le Caire, Egypt. pp.88-106, ⟨10.1007/978-3-642-38553-7_5⟩
Communication dans un congrès hal-00745247v3
Image document

Verifiability in e-Auction Protocols

Jannik Dreier , Hugo Jonker , Pascal Lafourcade
1st Workshop on Hot Issues in Security Principles and Trust (HotSpot'13), Mar 2013, Rome, Italy
Communication dans un congrès hal-01338057v1
Image document

Formal Verification of e-Auction Protocols

Jannik Dreier , Pascal Lafourcade , Yassine Lakhnech
International Conference on Principles of Security and Trust, Mar 2013, Rome, Italy. ⟨10.1007/978-3-642-36830-1_13⟩
Communication dans un congrès hal-01338020v1
Image document

Defining Verifiability in e-Auction Protocols

Jannik Dreier , Hugo Jonker , Pascal Lafourcade
Asia Conference on Information, Computer and Communications Security, ACM, May 2013, Hangzhou, China. ⟨10.1145/2484313.2484387⟩
Communication dans un congrès hal-01337416v1
Image document

Defining Privacy for Weighted Votes, Single and Multi-voter Coercion

Jannik Dreier , Pascal Lafourcade , Yassine Lakhnech
European Symposium on Research in Computer Security (ESORICS), Sep 2012, Pise, Italy. ⟨10.1007/978-3-642-33167-1_26⟩
Communication dans un congrès hal-01338037v1
Image document

A Formal Taxonomy of Privacy in Voting Protocols

Jannik Dreier , Pascal Lafourcade , Yassine Lakhnech
First IEEE International Workshop on Security and Forensics in Communication Systems (ICC'12 WS - SFCS), Jun 2012, Ottawa, Canada. ⟨10.1109/ICC.2012.6364938⟩
Communication dans un congrès hal-01338064v1
Image document

Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation

Jannik Dreier , Florian Kerschbaum
Third IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT'11), IEEE, Oct 2011, Boston, United States. ⟨10.1109/PASSAT/SocialCom.2011.19⟩
Communication dans un congrès hal-01338043v1
Image document

Vote-Independence: A Powerful Privacy Notion for Voting Protocols

Jannik Dreier , Pascal Lafourcade , Yassine Lakhnech
4th Canada-France MITACS Workshop on Foundations & Practice of Security (FPS'11), May 2011, Paris, France. ⟨10.1007/978-3-642-27901-0_13⟩
Communication dans un congrès hal-01338070v1
Image document

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR (Extended Version)

Jannik Dreier , Lucca Hirschi , Sasa Radomirovic , Ralf Sasse
[Research Report] LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy; ETH Zurich, Switzerland; University of Dundee. 2018
Rapport hal-01780544v1
Image document

On the Verifiability of (Electronic) Exams

Jannik Dreier , Rosario Giustolisi , Ali Kassem , Pascal Lafourcade , Gabriele Lenzini
[Technical Report] VERIMAG UMR 5104, Université Grenoble Alpes, France. 2015
Rapport hal-01337411v1
Image document

Secure Auctions Without Cryptography (extended version)

Jannik Dreier , Hugo Jonker , Pascal Lafourcade
[Technical Report] ETH Zurich. 2014
Rapport hal-01337415v1
Image document

Formal Verification of e-Auction Protocols

Jannik Dreier , Pascal Lafourcade , Yassine Lakhnech
[Technical Report] TR-2012-17, VERIMAG. 2012
Rapport hal-01338031v1
Image document

On Unique Decomposition of Processes in the Applied π-Calculus

Jannik Dreier , Cristian Ene , Pascal Lafourcade , Yassine Lakhnech
[Technical Report] VERIMAG UMR 5104, Université Grenoble Alpes, France. 2012
Rapport hal-01338012v1
Image document

Defining Privacy for Weighted Votes, Single and Multi-voter Coercion

Jannik Dreier , Pascal Lafourcade , Yassine Lakhnech
[Research Report] VERIMAG. 2012
Rapport hal-01338039v1
Image document

Vote-Independence: A Powerful Privacy Notion for Voting Protocols

Jannik Dreier , Pascal Lafourcade , Yassine Lakhnech
[Technical Report] VERIMAG UMR 5104, Université Grenoble Alpes, France. 2011
Rapport hal-01338071v1
Image document

A formal taxonomy of privacy in voting protocols

Jannik Dreier , Pascal Lafourcade , Yassine Lakhnech
[Technical Report] VERIMAG UMR 5104, Université Grenoble Alpes, France. 2011
Rapport hal-01338067v1
Image document

Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation

Jannik Dreier , Florian Kerschbaum
[Technical Report] IACR Cryptology ePrint Archive. 2011
Rapport hal-01338046v1