The provable security of ed25519: theory and practice J Brendel, C Cremers, D Jackson, M Zhao 2021 IEEE Symposium on Security and Privacy (SP), 1659-1676, 2021 | 59 | 2021 |
Factorization of frieze patterns M Weber, M Zhao arXiv preprint arXiv:1809.00274, 2018 | 19 | 2018 |
FIDO2, CTAP 2.1, and WebAuthn 2: Provable security and post-quantum instantiation N Bindel, C Cremers, M Zhao 2023 IEEE Symposium on Security and Privacy (SP), 1471-1490, 2023 | 15 | 2023 |
Provably Post-Quantum Secure Messaging with Strong Compromise Resilience and Immediate Decryption. C Cremers, M Zhao IACR Cryptol. ePrint Arch. 2022, 1481, 2022 | 4 | 2022 |
Automated Analysis of Protocols that use Authenticated Encryption: Analysing the Impact of the Subtle Differences between AEADs on Protocol Security C Cremers, A Dax, C Jacomme, M Zhao USENIX Security 2023, 2023 | 3 | 2023 |
Secure Messaging with Strong Compromise Resilience, Temporal Privacy, and Immediate Decryption C Cremers, M Zhao Cryptology ePrint Archive, 2022 | 3 | 2022 |
Provable security and real-world protocols: theory and practice M Zhao Saarländische Universitäts-und Landesbibliothek, 2023 | | 2023 |
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle {AEAD} Differences can impact Protocol Security C Cremers, A Dax, C Jacomme, M Zhao 32nd USENIX Security Symposium (USENIX Security 23), 5935-5952, 2023 | | 2023 |
Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements C Cremers, E Ronen, M Zhao Cryptology ePrint Archive, 2023 | | 2023 |