Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees., , , , and . ACM Conference on Computer and Communications Security, page 1802-1819. ACM, (2018)Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures., , , and . ACM Conference on Computer and Communications Security, page 2165-2180. ACM, (2019)Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions., and . EuroS&P, page 635-650. IEEE, (2019)Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman., and . CSF, page 78-93. IEEE, (2019)Strengthening the security of authenticated key exchange against bad randomness., and . Des. Codes Cryptogr., 86 (3): 481-516 (2018)Compositionality of Security Protocols: A Research Agenda.. VODCA@FOSAD, volume 142 of Electronic Notes in Theoretical Computer Science, page 99-110. Elsevier, (2004)From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries., and . IACR Cryptol. ePrint Arch., (2009)Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses., , , , , and . IACR Cryptol. ePrint Arch., (2022)Preface., , and . STM, volume 157 of Electronic Notes in Theoretical Computer Science, page 1-2. Elsevier, (2005)On Bitcoin Security in the Presence of Broken Cryptographic Primitives., , and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 201-222. Springer, (2016)