From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses., , , , , и . IACR Cryptol. ePrint Arch., (2022)Symbolic Proofs for Lattice-Based Cryptography., , , , , и . ACM Conference on Computer and Communications Security, стр. 538-555. ACM, (2018)Universal equivalence and majority of probabilistic programs over finite fields., , и . LICS, стр. 155-166. ACM, (2020)Symbolic Models for Isolated Execution Environments., , и . EuroS&P, стр. 530-545. IEEE, (2017)Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets., , и . ACM Conference on Computer and Communications Security, стр. 1427-1444. ACM, (2020)Universal Equivalence and Majority of Probabilistic Programs over Finite Fields., , и . ACM Trans. Comput. Log., 23 (1): 5:1-5:42 (2022)Subterm-Based Proof Techniques for Improving the Automation and Scope of Security Protocol Analysis., , и . CSF, стр. 200-213. IEEE, (2023)Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses., , , , , и . USENIX Security Symposium, стр. 5899-5916. USENIX Association, (2023)An Extensive Formal Analysis of Multi-factor Authentication Protocols., и . CSF, стр. 1-15. IEEE Computer Society, (2018)Symbolic Methods in Computational Cryptography Proofs., , , , и . CSF, стр. 136-151. IEEE, (2019)