Author of the publication

A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol.

, , and . EuroS&P, page 231-246. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication., , and . J. ACM, 65 (1): 1:1-1:41 (2018)Automatic Verification of Correspondences for Security Protocols. CoRR, (2008)Automatic verification of cryptographic protocols: a logic programming approach.. PPDP, page 1-3. ACM, (2003)Automated Security Proofs with Sequences of Games., and . CRYPTO, volume 4117 of Lecture Notes in Computer Science, page 537-554. Springer, (2006)Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif.. Found. Trends Priv. Secur., 1 (1-2): 1-135 (2016)Escape Analysis for Object-Oriented Languages: Application to Java.. OOPSLA, page 20-34. ACM, (1999)SIGPLAN Notices 34(10).Verification of Cryptographic Protocols: Tagging Enforces Termination., and . FoSSaCS, volume 2620 of Lecture Notes in Computer Science, page 136-152. Springer, (2003)Analysing the HPKE Standard., , , , , and . EUROCRYPT (1), volume 12696 of Lecture Notes in Computer Science, page 87-116. Springer, (2021)A Static Analyzer for Large Safety-Critical Software, , , , , , , and . ACM SIGPLAN PLDI'03, 548030, page 196--207. ACM Press, (June 2003)Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage., and . SP, page 417-431. IEEE Computer Society, (2008)