Author of the publication

A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol.

, , and . EuroS&P, page 231-246. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security protocols: from linear to classical logic by abstract interpretation.. Inf. Process. Lett., 95 (5): 473-479 (2005)Secrecy types for asymmetric communication., and . Theor. Comput. Sci., 298 (3): 387-415 (2003)Analyzing security protocols with secrecy types and logic programs., and . J. ACM, 52 (1): 102-146 (2005)Escape analysis for JavaTM: Theory and practice.. ACM Trans. Program. Lang. Syst., 25 (6): 713-775 (2003)From Secrecy to Authenticity in Security Protocols.. SAS, volume 2477 of Lecture Notes in Computer Science, page 342-359. Springer, (2002)Just fast keying in the pi calculus., , and . ACM Trans. Inf. Syst. Secur., 10 (3): 9 (2007)Automatic verification of correspondences for security protocols.. Journal of Computer Security, 17 (4): 363-434 (2009)SoK: Computer-Aided Cryptography., , , , , , and . SP, page 777-795. IEEE, (2021)A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol., , and . EuroS&P, page 231-246. IEEE, (2019)Composition Theorems for CryptoVerif and Application to TLS 1.3.. CSF, page 16-30. IEEE Computer Society, (2018)