Author of the publication

On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness.

, and . IACR Cryptology ePrint Archive, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman., and . CSF, page 78-93. IEEE, (2019)Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions., and . EuroS&P, page 635-650. IEEE, (2019)Strengthening the security of authenticated key exchange against bad randomness., and . Des. Codes Cryptogr., 86 (3): 481-516 (2018)On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees., , , , and . ACM Conference on Computer and Communications Security, page 1802-1819. ACM, (2018)Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures., , , and . ACM Conference on Computer and Communications Security, page 2165-2180. ACM, (2019)Compositionality of Security Protocols: A Research Agenda.. VODCA@FOSAD, volume 142 of Electronic Notes in Theoretical Computer Science, page 99-110. Elsevier, (2004)Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses., , , , , and . IACR Cryptol. ePrint Arch., (2022)From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries., and . IACR Cryptol. ePrint Arch., (2009)Preface., , and . STM, volume 157 of Electronic Notes in Theoretical Computer Science, page 1-2. Elsevier, (2005)Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries., and . CSL, volume 6247 of Lecture Notes in Computer Science, page 1-18. Springer, (2010)