Prime and Prejudice: Primality Testing Under Adversarial Conditions |
ACM CCS 2018
|
Security Analysis of eIDAS – The Cross-Country Authentication Scheme in Europe |
WOOT '18
|
Breaking and Fixing Gridcoin |
WOOT '17
|
Systematic Fuzzing and Testing of TLS Libraries |
ACM CCS 2016
|
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS |
WOOT '16
|
How to Break XML Encryption - Automatically |
Black Hat Europe 2015
|
How to Break XML Encryption – Automatically |
WOOT '15
|