Author of the publication

Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets.

, , and . ACM Conference on Computer and Communications Security, page 1427-1444. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symbolic Proofs for Lattice-Based Cryptography., , , , , and . ACM Conference on Computer and Communications Security, page 538-555. ACM, (2018)Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses., , , , , and . IACR Cryptol. ePrint Arch., (2022)Universal equivalence and majority of probabilistic programs over finite fields., , and . LICS, page 155-166. ACM, (2020)Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses., , , , , and . USENIX Security Symposium, page 5899-5916. USENIX Association, (2023)Subterm-Based Proof Techniques for Improving the Automation and Scope of Security Protocol Analysis., , and . CSF, page 200-213. IEEE, (2023)An Extensive Formal Analysis of Multi-factor Authentication Protocols., and . CSF, page 1-15. IEEE Computer Society, (2018)Symbolic Models for Isolated Execution Environments., , and . EuroS&P, page 530-545. IEEE, (2017)Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets., , and . ACM Conference on Computer and Communications Security, page 1427-1444. ACM, (2020)Universal Equivalence and Majority of Probabilistic Programs over Finite Fields., , and . ACM Trans. Comput. Log., 23 (1): 5:1-5:42 (2022)Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations., , and . IACR Cryptol. ePrint Arch., (2022)