Publications

(2021). An extensive formal analysis of multi-factor authentication protocols. ACM Transactions on Privacy and Security (TOPS).

PDF

(2020). Oracle simulation: a technique for protocol composition with long term shared secrets. Proceedings of the 27st ACM Conference on Computer and Communications Security (CCS'20).

PDF Long Version

(2020). Universal equivalence and majority on probabilistic programs over finite fields. Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS'20).

PDF

(2019). Symbolic methods in computational cryptography proofs. Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'19).

PDF DOI

(2018). Symbolic Proofs for Lattice-Based Cryptography. Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS'18).

PDF

(2018). An extensive formal analysis of multi-factor authentication protocols. Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'18).

PDF DOI

(2017). Symbolic Models for Isolated Execution Environments. Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17).

PDF DOI