Follow
Alexander Dax
Alexander Dax
PhD Student, Saarland University, CISPA Helmholtz Center for Information Security
Verified email at stud.uni-saarland.de
Title
Cited by
Cited by
Year
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
V Cheval, C Cremers, A Dax, L Hirschi, C Jacomme, S Kremer
32nd USENIX Security Symposium (USENIX Security 23), 5899-5916, 2023
152023
Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols
C Cremers, A Dax, N Medinger
Cryptology ePrint Archive, 2023
122023
How to Wrap it up-A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS# 11
A Dax, R Künnemann, S Tangermann, M Backes
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 62-6215, 2019
112019
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle {AEAD} Differences can impact Protocol Security
C Cremers, A Dax, C Jacomme, M Zhao
32nd USENIX Security Symposium (USENIX Security 23), 5935-5952, 2023
10*2023
Formal Analysis of {SPDM}: Security Protocol and Data Model version 1.2
C Cremers, A Dax, A Naska
32nd USENIX Security Symposium (USENIX Security 23), 6611-6628, 2023
52023
On the soundness of infrastructure adversaries
A Dax, R Künnemann
2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021
42021
Keeping Up with the KEMs: Stronger Security Notions for KEMs and Automated Analysis of KEM-based Protocols
A Dax, C Cremers, N Medinger
CISPA, 2024
2024
List of External Reviewers CSF 2021 (all submission cycles)
C Abate, AA de Amorim, T Antonopoulos, C Badertscher, G Battiston, ...
CSF 2019
M Algehed, A Russo, C Flanagan, P Vasilikos, HR Nielson, F Nielson, ...
The system can't perform the operation now. Try again later.
Articles 1–9