Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses V Cheval, C Cremers, A Dax, L Hirschi, C Jacomme, S Kremer 32nd USENIX Security Symposium (USENIX Security 23), 5899-5916, 2023 | 15 | 2023 |
Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols C Cremers, A Dax, N Medinger Cryptology ePrint Archive, 2023 | 12 | 2023 |
How to Wrap it up-A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS# 11 A Dax, R Künnemann, S Tangermann, M Backes 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 62-6215, 2019 | 11 | 2019 |
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle {AEAD} Differences can impact Protocol Security C Cremers, A Dax, C Jacomme, M Zhao 32nd USENIX Security Symposium (USENIX Security 23), 5935-5952, 2023 | 10* | 2023 |
Formal Analysis of {SPDM}: Security Protocol and Data Model version 1.2 C Cremers, A Dax, A Naska 32nd USENIX Security Symposium (USENIX Security 23), 6611-6628, 2023 | 5 | 2023 |
On the soundness of infrastructure adversaries A Dax, R Künnemann 2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021 | 4 | 2021 |
Keeping Up with the KEMs: Stronger Security Notions for KEMs and Automated Analysis of KEM-based Protocols A Dax, C Cremers, N Medinger CISPA, 2024 | | 2024 |
List of External Reviewers CSF 2021 (all submission cycles) C Abate, AA de Amorim, T Antonopoulos, C Badertscher, G Battiston, ... | | |
CSF 2019 M Algehed, A Russo, C Flanagan, P Vasilikos, HR Nielson, F Nielson, ... | | |