Publications

(2024). Post-quantum sound CryptoVerif and verification of hybrid TLS and SSH key-exchanges. Proceedings of the 37th IEEE Computer Security Foundations Symposium (CSF'24).

PDF

(2023). Subterm-based proof techniques for improving the automation and scope of security protocol analysis. Proceedings of the 36th IEEE Computer Security Foundations Symposium (CSF'23).

PDF

(2022). A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols. Proceedings of the 43nd IEEE Symposium on Security and Privacy (S&P'22).

PDF

(2020). Oracle simulation: a technique for protocol composition with long term shared secrets. Proceedings of the 27st ACM Conference on Computer and Communications Security (CCS'20).

PDF Long Version

(2020). Universal equivalence and majority on probabilistic programs over finite fields. Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS'20).

PDF

(2019). Symbolic methods in computational cryptography proofs. Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'19).

PDF DOI URL

(2018). Symbolic Proofs for Lattice-Based Cryptography. Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS'18).

PDF URL

(2018). An extensive formal analysis of multi-factor authentication protocols. Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'18).

PDF DOI URL

(2018). Symbolic Models for Isolated Execution Environments. Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17).

PDF DOI URL