A cryptographic analysis of UMTS/LTE AKA, Proceedings of ACNS, vol.9696, pp.18-35, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01510791
Entity authentication and key distribution, Advances in Cryptology-CRYPTO, pp.232-249, 1993. ,
DOI : 10.1007/3-540-48329-2_21
URL : https://link.springer.com/content/pdf/10.1007%2F3-540-48329-2_21.pdf
Verified models and reference implementations for the TLS 1.3 standard candidate, Proceedings of S&P, pp.483-502, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01575920
Content delivery over TLS: a cryptographic analysis of Keyless SSL, Proceedings of Euro S&P, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01673853
Implementing and proving the tls 1.3 record layer, Cryptology ePrint Archive, 1178. ,
URL : https://hal.archives-ouvertes.fr/hal-01674096
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS, Proceedings of IEEE S&P 2014, pp.98-113, 2014. ,
DOI : 10.1109/sp.2014.14
URL : https://hal.archives-ouvertes.fr/hal-01102259
Implementing TLS with verified cryptopgrahic security, Proceedings of IEEE S&P 2013, pp.445-469, 2013. ,
DOI : 10.1109/sp.2013.37
URL : http://ieee-security.org/TC/SP2013/papers/4977a445.pdf
Proving the TLS handshake secure (as it is), CRYPTO, pp.235-255, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01102231
Less is more: Relaxed yet composable security notions for key exchange, International Journal of Information Security, vol.12, issue.4, pp.267-297, 2013. ,
DOI : 10.1007/s10207-013-0192-y
URL : http://eprint.iacr.org/2012/242.pdf
A modular security analysis of EAP and IEEE 802.11, Proceedings of PKC, vol.10175, 2017. ,
Safely exporting keys from secure channels: on the security of EAP-TLS and TLS key exporters, 2016. ,
FLEXTLS: A tool for testing TLS implementations, Proceedings of USENIX WOOT 2015, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01295035
A cryptographic analysis of the TLS 1.3 handshake protocol candidates, ACM CCS, pp.1197-1210, 2015. ,
A cryptographic analysis of the TLS 1.3 draft-10 full and pre-shared key handshake protocol, 2016. ,
The security impact of HTTPS interception, Proceedings of NDSS, 2017. ,
Replay attacks on zero roundtrip time: the case of the TLS 1.3 handshake candidates, Proceedings of Euro S& P, pp.60-75, 2017. ,
Achieving better privacy for the 3gpp aka protocol, Proceedings of PETS (PoPETS), 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01510801
Extracting the SuperFish certificate ,
0-RTT key exchange with full forward secrecy, Advances in cryptology-EUROCRYPT, vol.10212, pp.519-548 ,
, , 2017.
On the security of TLS-DHE in the standard model, Advances in Cryptology-CRYPTO, vol.7417, pp.273-293, 2012. ,
On the security of TLS 1.3 and QUIC against weaknesses in PKCS#1 v1.5 encryption, Proceedings of ACM CCS 2015, 2015. ,
de-)constructing TLS. IACR ePrint archive, vol.020, 2014. ,
DOI : 10.1007/978-3-319-26617-6_5
URL : https://zenodo.org/record/56510/files/8-De-Constructing_TLS.pdf
De-)constructing TLS 1.3, Proceedings of Indocrypt, vol.9462, pp.85-102, 2015. ,
DOI : 10.1007/978-3-319-26617-6_5
URL : https://zenodo.org/record/56510/files/8-De-Constructing_TLS.pdf
A modular security analysis of eap and ieee 802.11, 2017. ,
On the security of the TLS protocol: A systematic analysis, Proceedings of CRYPTO 2013, vol.8042, pp.429-448, 2013. ,
The OPTLS protocol and tls 1.3, Proceedings of Euro S&P, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01378195
TLS record protocol: Security analysis and defense-in-depth countermeasures, Proceedings of ACM ASIACCS 2015, pp.225-236, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01154820
Multiple handshakes security of TLS 1.3 candidates, Proceedings of S&P, pp.485-505, 2016. ,
Comparing approaches for web and DNS infrastructure security. goo.gl/PBD2N6, 2016. ,
Lurk tls dtls use cases, 2016. ,
A modular security analysis of the TLS handshake protocol, Proceedings of ASIACRYPT 2008, vol.5350, pp.55-73, 2008. ,
And then there were more: Secure communication for more than two parties, the 13th International Conference on emerging Networking EXperiments and Technologies, pp.88-100, 2017. ,
Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS, Proceedings of SIGCOMM 2015, pp.199-212, 2015. ,
TLS proxies: Friend or foe, Proceedings of IMC, pp.551-557, 2016. ,
Cloudflare reverse proxies are dumping uninitialized memory, 2015. ,
Tag size does matter: Attacks and proofs for the TLS record protocol, Advances in Cryptology-ASIACRYPT 2011, vol.7073, pp.372-389, 2011. ,
Dependent types and multi-monadic effects in F*, 43nd ACM Symposium on Principles of Programming Languages, pp.256-270, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01265793
Beurdouche. Hacl*: A verified modern cryptographic library, ACM CCS 2017. Cryptology ePrint Archive, 2017. ,