CryptoVerif users

  1. Aaron D. Jaggard, Andre Scedrov and Joe-Kai Tsay. Computationally Sound Mechanized Proof of PKINIT for Kerberos. In Workshop on Formal and Computational Cryptography - FCC 2007.
  2. Karthikeyan Bhargavan, Ricardo Corin and Cedric Fournet. Crypto-Verifying Protocol Implementations in ML. In Workshop on Formal and Computational Cryptography - FCC 2007.
  3. Karthikeyan Bhargavan, Ricardo Corin, CÚdric Fournet, and Eugen Zalinescu. Cryptographically Verified Implementations for TLS. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08), pages 459-468, October 2008. Available at
  4. Bo Meng. Automatic Verification of Deniable Authentication Protocol in a Probabilistic Polynomial Calculus with Cryptoverif. In Information Technology Journal, 10(4):717-735, 2011. Available at
  5. Bo Meng. Automatic Formal Framework of Coercion-resistance in Internet Voting Protocols with CryptoVerif in Computational Model. In Information Technology Journal, 11(7):741-750, 2012. Available at
  6. Bo Meng and Wei Chen. Computer Assisted Proof of Resistance of Denial of Service Attacks in Security Protocols Based on Events with CryptoVerif in Computational Model. In International Journal of Digital Content Technology and its Applications, 6(3):109-121, 2012. Available at
  7. Joe-Kai Tsay and Stig F. Mj°lsnes. A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. In Computer Network Security (MMM-ACNS'12), Lecture Notes in Computer Science, volume 7531, 2012, pp 65-76. Available at
  8. Mihhail Aizatulin, Andrew Gordon, and Jan JŘrjens. Computational Verification of C Protocol Implementations by Symbolic Execution. In CCS 2012. Available at
If you have written a research paper using CryptoVerif, and want it to be added to this page, or if you want the reference to your paper to be removed or corrected, please contact Bruno Blanchet.
Bruno Blanchet