Up a level |
(2023) Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security.
(2023) Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations.
(2023) Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
(2022) Subterm-based proof techniques for improving the automation and scope of security protocol analysis.
(2022) SAPIC+: protocol verifiers of the world, unite!
(2022) A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.
(2021) An Interactive Prover for Protocol Verification in the Computational Model.