Up a level |
(2023) Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security.
(2023) Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
(2023) Formal Analysis of SPDM: Security Protocol and Data Model version 1.2.
(2021) On the Soundness of Infrastructure Adversaries.
(2019) How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS#11.