Author of the publication

Downgrade Resilience in Key-Exchange Protocols.

, , , , , and . IEEE Symposium on Security and Privacy, page 506-525. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Reflexive CHAM and the Join-Calculus., and . Proceedings of the 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, page 372-385. Association for Computing Machinery, (1996)Private authentication., and . Theor. Comput. Sci., 322 (3): 427-476 (2004)Verified Cryptographic Implementations for TLS, , , and . ACM Trans. Inf. Syst. Secur., 15 (1): 3:1--3:32 (March 2012)The Join Calculus: A Language for Distributed Mobile Programming., and . APPSEM, volume 2395 of Lecture Notes in Computer Science, page 268-332. Springer, (2000)Key-schedule Security for the TLS 1.3 Standard., , , , , and . IACR Cryptol. ePrint Arch., (2021)A Formal Implementation of Value Commitment., , and . ESOP, volume 4960 of Lecture Notes in Computer Science, page 383-397. Springer, (2008)A Calculus of Mobile Agents., , , , and . CONCUR, volume 1119 of Lecture Notes in Computer Science, page 406-421. Springer, (1996)A Top-Down Look at a Secure Message., , and . FSTTCS, volume 1738 of Lecture Notes in Computer Science, page 122-141. Springer, (1999)JoCaml: A Language for Concurrent Distributed and Mobile Programming., , , and . Advanced Functional Programming, volume 2638 of Lecture Notes in Computer Science, page 129-158. Springer, (2002)PAC: Practical Accountability for CCF., , , , , , , , , and 2 other author(s). CoRR, (2021)