Author of the publication

Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.

, , , , , and . USENIX Security Symposium, page 5899-5916. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for compositional verification of security protocols, , , , , and . CoRR, (2006)Abstractions for security protocol verification., , and . J. Comput. Secur., 26 (4): 459-508 (2018)Complete Characterization of Security Protocols by Pattern Refinement.. Formal Protocol Verification Applied, volume 07421 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters., , and . USENIX Security Symposium, page 1-17. USENIX Association, (2020)A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols., , and . SP, page 125-141. IEEE, (2022)Operational Semantics of Security Protocols., and . Scenarios: Models, Transformations and Tools, volume 3466 of Lecture Notes in Computer Science, page 66-89. Springer, (2003)Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5., , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 389-407. Springer, (2017)On Post-compromise Security., , and . CSF, page 164-178. IEEE Computer Society, (2016)Keeping data secret under full compromise using porter devices., , , and . ACSAC, page 241-250. ACM, (2010)Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures., , , and . ACM Conference on Computer and Communications Security, page 2165-2180. ACM, (2019)