Formally Verified Cryptographic Web Applications in WebAssembly |
40th IEEE Symposium on Security and Privacy
|
A Formal Treatment of Accountable Proxying over TLS |
39th IEEE Symposium on Security and Privacy
|
Implementing and Proving the TLS 1.3 Record Layer |
38th IEEE Symposium on Security and Privacy
|
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate |
38th IEEE Symposium on Security and Privacy
|
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN |
ACM CCS 2016
|
Downgrade Resilience in Key-Exchange Protocols |
37th IEEE Symposium on Security and Privacy
|
FLEXTLS: A Tool for Testing TLS Implementations |
WOOT '15
|
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS |
35th IEEE Symposium on Security and Privacy
|
Web-based Attacks on Host-Proof Encrypted Storage |
WOOT '12
|