The provable security of ed25519: theory and practice J Brendel, C Cremers, D Jackson, M Zhao 2021 IEEE Symposium on Security and Privacy (SP), 1659-1676, 2021 | 77 | 2021 |
FIDO2, CTAP 2.1, and WebAuthn 2: Provable security and post-quantum instantiation N Bindel, C Cremers, M Zhao 2023 IEEE Symposium on Security and Privacy (SP), 1471-1490, 2023 | 23 | 2023 |
Factorization of frieze patterns M Weber, M Zhao arXiv preprint arXiv:1809.00274, 2018 | 19 | 2018 |
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle {AEAD} Differences can impact Protocol Security C Cremers, A Dax, C Jacomme, M Zhao 32nd USENIX Security Symposium (USENIX Security 23), 5935-5952, 2023 | 9 | 2023 |
Secure messaging with strong compromise resilience, temporal privacy, and immediate decryption C Cremers, M Zhao 2024 IEEE Symposium on Security and Privacy (SP), 2591-2609, 2024 | 4 | 2024 |
Automated Analysis of Protocols that use Authenticated Encryption: Analysing the Impact of the Subtle Differences between AEADs on Protocol Security (Full version) C Cremers, A Dax, C Jacomme, M Zhao USENIX Security, 2023 | 4 | 2023 |
Provably Post-Quantum Secure Messaging with Strong Compromise Resilience and Immediate Decryption. C Cremers, M Zhao IACR Cryptol. ePrint Arch. 2022, 1481, 2022 | 4 | 2022 |
Multi-stage group key distribution and pakes: Securing zoom groups against malicious servers without new security elements C Cremers, E Ronen, M Zhao 2024 IEEE Symposium on Security and Privacy (SP), 2686-2704, 2024 | 1 | 2024 |
An Extended Hierarchy of Security Notions for Threshold Signature Schemes and Automated Analysis of Protocols That Use Them C Cremers, A Peltonen, M Zhao Cryptology ePrint Archive, 2024 | | 2024 |
Provable security and real-world protocols: theory and practice M Zhao Saarländische Universitäts-und Landesbibliothek, 2023 | | 2023 |