Lucky thirteen: Breaking the TLS and DTLS record protocols, IEEE Symposium on Security and Privacy (SP'13), 2013. ,
Entity authentication and key distribution, CRYPTO, pp.232-249, 1993. ,
DOI : 10.1007/3-540-48329-2_21
URL : https://link.springer.com/content/pdf/10.1007%2F3-540-48329-2_21.pdf
A messy state of the union: Taming the composite state machines of TLS, Proceedings of IEEE S&P 2015, pp.535-552, 2015. ,
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS, Proceedings of IEEE S&P 2014, pp.98-113, 2014. ,
DOI : 10.1109/sp.2014.14
URL : https://hal.archives-ouvertes.fr/hal-01102259
Safely exporting keys from secure channels: on the security of EAP-TLS and TLS key exporters, 2016. ,
A cryptographic analysis of the TLS 1.3 handshake protocol candidates, ACM CCS, pp.1197-1210, 2015. ,
Terminating ssl connections without locally-accessible private keys, p.75, 2013. ,
On the security of TLS-DHE in the standard model, Proceedings of CRYPTO 2012, vol.7417, pp.273-293, 2012. ,
, Proceedings of Indocrypt, vol.9462, pp.85-102, 2015.
On the security of the TLS protocol: A systematic analysis, Proceedings of CRYPTO 2013, vol.8042, pp.429-448, 2013. ,
The OPTLS protocol and tls 1.3, Proceedings of Euro S&P, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01378195
Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS, Proceedings of SIGCOMM 2015, pp.199-212, 2015. ,
An analysis of TLS handshake proxying, Proceedings of TrustCom, 2015. ,
DOI : 10.1109/trustcom.2015.385