{"id":56,"date":"2015-06-16T13:44:07","date_gmt":"2015-06-16T11:44:07","guid":{"rendered":"http:\/\/members.loria.fr\/thierrygartiser\/?page_id=56"},"modified":"2026-03-10T14:23:05","modified_gmt":"2026-03-10T12:23:05","slug":"accueil","status":"publish","type":"page","link":"https:\/\/members.loria.fr\/JDreier\/","title":{"rendered":"Jannik DREIER"},"content":{"rendered":"<p>Ma\u00eetre de Conf\u00e9rences (Associate Professor) at <a href=\"http:\/\/www.univ-lorraine.fr\/\">Universit\u00e9 de Lorraine<\/a>.<\/p>\n<p>Teaching at <a href=\"http:\/\/telecomnancy.univ-lorraine.fr\/\">TELECOM Nancy<\/a> and research in the <a href=\"https:\/\/team.inria.fr\/pesto\/\">PESTO<\/a> team at <a href=\"http:\/\/www.loria.fr\/\">LORIA<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Research<\/strong><\/p>\n<ul>\n<li>protocol security<\/li>\n<li>(computer-assisted) formal verification of security protocols<\/li>\n<li>theoretical foundations (process algebra, rewriting, &#8230;)<\/li>\n<li>privacy-preserving computations and applications<\/li>\n<\/ul>\n<p>I am co-developing the <a href=\"http:\/\/tamarin-prover.github.io\/\">Tamarin prover<\/a>. We won the <strong><a href=\"https:\/\/rwc.iacr.org\/LevchinPrize\/\">Levchin Prize<\/a><\/strong>!<\/p>\n<p>I am co-chairing the <a href=\"https:\/\/gtmfsec.irisa.fr\/\">Working Group on Formal Methods for Security<\/a>.<\/p>\n<p>I am head of the <a href=\"https:\/\/fm.loria.fr\/\">Department of Formal Methods<\/a> of <a href=\"https:\/\/www.loria.fr\/\">LORIA<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Teaching<\/strong><\/p>\n<p>Current (at TELECOM Nancy):<\/p>\n<ul>\n<li>Cyber Security Awareness<\/li>\n<li>Introduction to Cryptography<\/li>\n<li>Advanced Cryptography<\/li>\n<li>Protocol Security and Verification<\/li>\n<li><a href=\"https:\/\/cyberhumanumest.com\/\">Cyber Humanum Est<\/a><\/li>\n<\/ul>\n<p>Past:<\/p>\n<ul>\n<li>TELECOM Nancy: Mathematical Logic<\/li>\n<li>TELECOM Nancy: Language Theory<\/li>\n<li>TELECOM Nancy: Introduction to Theoretical Computer Science, Object Oriented Programming<\/li>\n<li><a href=\"http:\/\/www.ethz.ch\/\">ETH Z\u00fcrich<\/a>: <a href=\"http:\/\/www.infsec.ethz.ch\/education\/as2014\/seclab\">Applied Security Laboratory<\/a>, <a href=\"http:\/\/www.infsec.ethz.ch\/education\/as2014\/seceng\">Security Engineering<\/a><\/li>\n<li><a href=\"http:\/\/www.itu.dk\/\">ITU Denmark<\/a>: PhD Course on Code Scanning<\/li>\n<li><a href=\"http:\/\/www.ujf-grenoble.fr\/\">UJF<\/a>&#8211;<a href=\"http:\/\/www-ufrima.imag.fr\/\">UFR IMA2G<\/a>: <a href=\"http:\/\/www.ujf-grenoble.fr\/formation\/diplomes\/masters\/domaine-sciences-technologies-sante\/master-mention-mathematiques-informatique-specialite-securite-audit-informatique-legale-safe-p--218737.htm\">Master SAFE<\/a>: Excercises <a href=\"http:\/\/www-verimag.imag.fr\/%7Eplafourc\/teaching\/SAFE_2012_2013_Security_Models.php\">Security models<\/a><\/li>\n<li><a href=\"http:\/\/ensimag.grenoble-inp.fr\/\">ENSIMAG<\/a>: <a href=\"http:\/\/ensimag.grenoble-inp.fr\/formation\/m2p-specialite-cryptologie-securite-et-codage-de-l-information-354113.kjsp?RH=ENSIMAG-03_R-ensei\">M2 Crypto<\/a>:\u00a0Excercises <a href=\"http:\/\/www-verimag.imag.fr\/%7Eplafourc\/teaching\/Master_Pro_2_2012_2013.php\">Security models<\/a>: proofs, protocols and politics<\/li>\n<li><a href=\"http:\/\/www.ujf-grenoble.fr\/\">UJF<\/a>&#8211;<a href=\"http:\/\/ufrima.imag.fr\/\">UFR IM2AG<\/a>: Lab excercises on networks<\/li>\n<li><a href=\"http:\/\/www.ujf-grenoble.fr\/\">UJF<\/a>&#8211;<a href=\"http:\/\/dlst.ujf-grenoble.fr\/\">DLST<\/a>:\u00a0Excercises on algorithms and functional programming in Caml, excercises on formal logic and reasoning<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ma\u00eetre de Conf\u00e9rences (Associate Professor) at <a href=\"http:\/\/www.univ-lorraine.fr\/\">Universit\u00e9 de Lorraine<\/a>.<\/p>\n<p>Teaching at <a href=\"http:\/\/telecomnancy.univ-lorraine.fr\/\">TELECOM Nancy<\/a> and research in the <a href=\"https:\/\/team.inria.fr\/pesto\/\">PESTO<\/a> team at <a href=\"http:\/\/www.loria.fr\/\">LORIA<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>Research<\/p>\n<ul>\n<li>protocol security<\/li>\n<li>(computer-assisted) formal verification of security protocols<\/li>\n<li>theoretical foundations (process algebra, rewriting, &#8230;)<\/li>\n<li>privacy-preserving computations and applications<\/li>\n<\/ul>\n<p>I am co-developing the <a href=\"http:\/\/tamarin-prover.github.io\/\">Tamarin prover<\/a>. We won the <a href=\"https:\/\/rwc.iacr.org\/LevchinPrize\/\">Levchin Prize<\/a>!<\/p>\n<p>I am co-chairing the <a href=\"https:\/\/gtmfsec.irisa.fr\/\">Working Group on Formal Methods for Security<\/a>.<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-56","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/pages\/56","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/comments?post=56"}],"version-history":[{"count":32,"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/pages\/56\/revisions"}],"predecessor-version":[{"id":416,"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/pages\/56\/revisions\/416"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/media?parent=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}