Author of the publication

A Tutorial-Style Introduction to DY*.

, , , , , , and . Protocols, Strands, and Logic, volume 13066 of Lecture Notes in Computer Science, page 77-97. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols., , and . EuroS&P, page 356-370. IEEE, (2019)EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , and 5 other author(s). IACR Cryptol. ePrint Arch., (2019)Foundations of WebAssembly (Dagstuhl Seminar 23101)., , , and . Dagstuhl Reports, 13 (3): 1-16 (March 2023)Imperfect forward secrecy: how Diffie-Hellman fails in practice., , , , , , , , , and 4 other author(s). Commun. ACM, 62 (1): 106-114 (2019)Verisim: Formal Analysis of Network Simulations., , , , , , and . IEEE Trans. Software Eng., 28 (2): 129-145 (2002)Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations., , , and . SP, page 107-124. IEEE, (2022)Cryptographic Verification by Typing for a Sample Protocol Implementation., , and . FOSAD, volume 6858 of Lecture Notes in Computer Science, page 66-100. Springer, (2011)Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate., , and . IEEE Symposium on Security and Privacy, page 483-502. IEEE Computer Society, (2017)Towards Unified Authorization for Android., and . ESSoS, volume 7781 of Lecture Notes in Computer Science, page 42-57. Springer, (2013)Secure Implementations for Typed Session Abstractions., , , , and . CSF, page 170-186. IEEE Computer Society, (2007)