Search for persons
X
?
Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2024 ,
1
A Holistic Security Analysis of Monero Transactions:
, In:
?
2023 IEEE 36th Computer Security Foundations Symposium (CSF) ,
3
Subterm-Based Proof Techniques for Improving the Automation..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
5
FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
6
A Logic and an Interactive Prover for the Computational Pos..:
, In:
?
Advances in Cryptology – CRYPTO 2022; Lecture Notes in Computer Science ,
7
CHIP and CRISP: Protecting All Parties Against Compromise T..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
12
The Provable Security of Ed25519: Theory and Practice:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
13
BUFFing signature schemes beyond unforgeability and the cas..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
14
Clone Detection in Secure Messaging: Improving Post-Comprom..:
, In:
?
2020 IEEE 33rd Computer Security Foundations Symposium (CSF) ,
15