CryptoVerif users

  1. Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, and Eugen Zalinescu. Cryptographically Verified Implementations for TLS. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08), pages 459-468, October 2008. Available at
  2. Bo Meng. Automatic Verification of Deniable Authentication Protocol in a Probabilistic Polynomial Calculus with Cryptoverif. In Information Technology Journal, 10(4):717-735, 2011. Available at
  3. Bo Meng. Computer Aided Verification of Accountability in Electronic Payment Protocol with CryptoVerif. International Journal of Advancements in Computing Technology, Volume 3, Number 3, April 2011. Available at
  4. Bo Meng. Automatic Formal Framework of Coercion-resistance in Internet Voting Protocols with CryptoVerif in Computational Model. In Information Technology Journal, 11(7):741-750, 2012. Available at
  5. Joe-Kai Tsay and Stig F. Mjølsnes. A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. In Computer Network Security (MMM-ACNS'12), Lecture Notes in Computer Science, volume 7531, 2012, pp 65-76. Available at
  6. Mihhail Aizatulin, Andrew Gordon, and Jan Jürjens. Computational Verification of C Protocol Implementations by Symbolic Execution. In CCS 2012. Available at
  7. Karine Altisen, Stéphane Devismes, Raphaël Jamet, and Pascal Lafourcade. Routage sécurisé et résilient pour réseaux de capteurs sans fil. In: 15èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), May 2013, Pornic, France. pp.1-4, 2013. Available at
  8. Bo Meng, Leyuan Niu, Yitong Yang, and Zimao Li. Mechanized Verification of Security Properties of Transport Layer Security 1.2 Protocol with CryptoVerif in Computational Model. In: Information Technology Journal 13(4):601-613, 2014. Available at
  9. Jinli Zhang, Jintian Lu, Zhongyu Wan, Jing Li, and Bo Meng. Security Analysis of OpenID Connect Protocol with Cryptoverif in the Computational Model. In: International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2016), pp. 925-934. Available at
  10. Weijin Wang, Yu Qin, Bo Yang, Yingjun Zhang, and Dengguo Feng. Automated Security Proof of Cryptographic Support Commands in TPM 2.0. In: International Conference on Information and Communications Security (ICICS 2016), LNCS, volume 9977, pp. 431-441, 2016. Available at
  11. Karine Altisen, Stéphane Devismes, Raphaël Jamet, and Pascal Lafourcade. SR3: secure resilient reputation-based routing. In: Wireless Networks, October 2017, Volume 23, Issue 7, pp. 2111 2133. Available at
If you have written a research paper using CryptoVerif, and want it to be added to this page, or if you want the reference to your paper to be removed or corrected, please contact Bruno Blanchet.
Bruno Blanchet