Tomasz Truderung, Institute of Computer Science, Wroclaw Uniwersity, Poland
Contact info
See also

Publications

  1. Ralf Küsters, Tomasz Truderung, and Jürgen Graf.
    A Framework for the Cryptographic Verification of Java-like Programs.
    In IEEE Computer Security Foundations Symposium, CSF 2012, IEEE Computer Society, 2012. To appear

    [ pdf | extended version (Cryptology ePrint Archive 2012/153) ]

  2. R. Küsters, T. Truderung, and A. Vogt.
    Clash Attacks on the Verifiability of E-Voting Systems.
    In IEEE Symposium on Security and Privacy (S&P 2012), pp. 395-409, IEEE Computer Society, 2012.

    [ pdf | extended version (Cryptology ePrint Archive 2012/116) ]

  3. R. Küsters, T. Truderung, and A. Vogt.
    A Game-Based Definition of Coercion-Resistance and its Applications.
    Journal of Computer Security (special issue of selected CSF 2010 papers), 2011. To appear.
  4. R. Küsters, T. Truderung, and A. Vogt.
    Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study.
    In IEEE Symposium on Security and Privacy (S&P 2011), IEEE Computer Society, 2011. To appear.

    [ pdf | extended version (Cryptology ePrint Archive 2011/517) ]

  5. R. Küsters, T. Truderung,
    Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach.
    Accepted for publication in Journal of Automated Reasoning (JAR), 2011

    [ pdf ]

  6. R. Küsters, T. Truderung, and A. Vogt.
    Proving Coercion-Resistance of Scantegrity II.
    In Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010)

    [ pdf ]

  7. R. Küsters, T. Truderung, and A. Vogt,
    Accountabiliy: Definition and Relationship to Verifiability.
    In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010), ACM Press, 2010.

    [ pdf | Extended version (Cryptology ePrint Archive 2010/236) ]

  8. R. Küsters, H. Schnoor, T. Truderung,
    A Formal Definition of Online Abuse-freeness.
    In Proceedings of the 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010)

    [ Extended version ]

  9. R. Küsters, T. Truderung, A. Vogt,
    A Game-Based Definition of Coercion-Resistance and its Applications.
    In IEEE Computer Security Foundations Symposium (CSF 2010)

    [ pdf | Extended version (Cryptology ePrint Archive 2009/582) ]

  10. R. Küsters, T. Truderung, A. Vogt,
    Improving and Simplifying a Variant of Pret a Voter.
    In proceedings of the 2nd International Conference on E-Voting and Identity (VOTE-ID 2009)

    [ pdf ]

  11. R. Küsters, T. Truderung,
    Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation.
    In proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF 2009)

    [ pdf ]

  12. R. Küsters, T. Truderung,
    An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols.
    In proceedints of IEEE Symposium on Security and Privacy (S&P 2009), 2009

    [ pdf | Extended version (arXiv:0903.0802) ]

  13. R. Küsters, T. Truderung,
    Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach.
    In proceedings of CCS 2008 (ACM Conference on Computer and Communications Security)

    [ pdf | Extended version (arXiv:0808.0634) ]

  14. D. Kähler, R. Küsters, and T. Truderung,
    Infinite State AMC-Model Checking for Cryptographic Protocols.
    In proceedings of LICS 2007, IEEE Computer Society 2007

    [ pdf | Extended version (pdf) ]

  15. R. Küsters and T. Truderung,
    On the Automatic Analysis of Recursive Security Protocols with XOR.
    In proceedings of STACS 2007, LNCS 4393, Springer 2007

    [ Extended version (pdf) ]

  16. T. Truderung,
    Selecting Theories and Recursive Protocols.
    In proceedings of CONCUR 2005, LNCS 3653, Springer 2005

    [ ps | pdf ]

  17. T. Truderung,
    Regular Protocols and Attacks with Regular Knowledge.
    In proceedings of CADE 2005, LNCS 3632, Springer 2005

    [ ps | pdf | Extended version (ps) | Extended version (pdf) ]

  18. P. Rychlikowski, T. Truderung,
    Set Constraints on Regular Terms.
    In proceedings of CSL 2004, LNCS 3210, Springer 2004

    [ ps | pdf ]

  19. J. Marcinkowski, T. Truderung,
    Optimal Complexity Bounds for Positive LTL Games.
    In proceedings of CSL 2002, LNCS 2471, Springer 2002.

    [ ps | pdf ]

  20. P. Rychlikowski, T. Truderung,
    Polymorphic Directional Types For Logic Programming.
    In proceedings of PPDP 2001

    [ ps | pdf ]