1

Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging

Post-quantum sound CryptoVerif and verification of hybrid TLS and SSH key-exchanges

A comprehensive, formal and automated analysis of the EDHOC protocol

Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security

Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations

Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses

Subterm-based proof techniques for improving the automation and scope of security protocol analysis

A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols

SAPIC+: protocol verifiers of the world, unite!

An interactive prover for protocol verification in the computational model