Spremljaj
Alexander Dax
Alexander Dax
PhD Student, Saarland University, CISPA Helmholtz Center for Information Security
Preverjeni e-poštni naslov na stud.uni-saarland.de - Domača stran
Naslov
Navedeno
Navedeno
Leto
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
V Cheval, C Cremers, A Dax, L Hirschi, C Jacomme, S Kremer
32nd USENIX Security Symposium (USENIX Security 23), 5899-5916, 2023
172023
Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols
C Cremers, A Dax, N Medinger
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
13*2024
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle {AEAD} Differences can impact Protocol Security
C Cremers, A Dax, C Jacomme, M Zhao
32nd USENIX Security Symposium (USENIX Security 23), 5935-5952, 2023
13*2023
Formal Analysis of {SPDM}: Security Protocol and Data Model version 1.2
C Cremers, A Dax, A Naska
32nd USENIX Security Symposium (USENIX Security 23), 6611-6628, 2023
112023
How to Wrap it up-A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS# 11
A Dax, R Künnemann, S Tangermann, M Backes
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 62-6215, 2019
112019
On the soundness of infrastructure adversaries
A Dax, R Künnemann
2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021
42021
Breaking and Provably Restoring Authentication: A Formal Analysis of SPDM 1.2 including Cross-Protocol Attacks
C Cremers, A Dax, A Naska
Cryptology ePrint Archive, 2024
2024
List of External Reviewers CSF 2021 (all submission cycles)
C Abate, AA de Amorim, T Antonopoulos, C Badertscher, G Battiston, ...
CSF 2019
M Algehed, A Russo, C Flanagan, P Vasilikos, HR Nielson, F Nielson, ...
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–9