Personensuche
X
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
2
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical ..:
, In:
?
2023 IEEE 36th Computer Security Foundations Symposium (CSF) ,
3
Proving Unlinkability Using ProVerif Through Desynchronised..:
, In:
?
Lecture Notes in Computer Science; Progress in Cryptology – INDOCRYPT 2022 ,
4
New Algorithm for Exhausting Optimal Permutations for Gener..:
, In:
?
2022 IEEE 35th Computer Security Foundations Symposium (CSF) ,
6
Cracking the Stateful Nut: Computational Proofs of Stateful..:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
7
One Vote Is Enough for Analysing Privacy:
, In:
?
Selected Areas in Cryptography; Lecture Notes in Computer Science ,
8
A Simpler Model for Recovering Superpoly on Trivium:
, In:
?
2022 IEEE 35th Computer Security Foundations Symposium (CSF) ,
9
A small bound on the number of sessions for security protoc..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
10
An Interactive Prover for Protocol Verification in the Comp..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
11
Efficient Methods to Search for Best Differential Character..:
, In:
?
2020 IEEE 33rd Computer Security Foundations Symposium (CSF) ,
13
A Method for Proving Unlinkability of Stateful Protocols:
, In:
?
Computer Security – ESORICS 2020; Lecture Notes in Computer Science ,
15