| Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses V Cheval, C Cremers, A Dax, L Hirschi, C Jacomme, S Kremer 32nd USENIX Security Symposium (USENIX Security 23), 5899-5916, 2023 | 34 | 2023 |
| Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols C Cremers, A Dax, N Medinger Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | 30 | 2024 |
| Automated Analysis of Protocols that use Authenticated Encryption: How Subtle {AEAD} Differences can impact Protocol Security C Cremers, A Dax, C Jacomme, M Zhao 32nd USENIX Security Symposium (USENIX Security 23), 5935-5952, 2023 | 22* | 2023 |
| Formal analysis of {SPDM}: Security protocol and data model version 1.2 C Cremers, A Dax, A Naska 32nd USENIX Security Symposium (USENIX Security 23), 6611-6628, 2023 | 22 | 2023 |
| How to Wrap it up-A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS# 11 A Dax, R Künnemann, S Tangermann, M Backes 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 62-6215, 2019 | 15 | 2019 |
| Breaking and provably restoring authentication: A formal analysis of SPDM 1.2 including cross-protocol attacks C Cremers, A Dax, A Naska Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications …, 2025 | 5 | 2025 |
| On the soundness of infrastructure adversaries A Dax, R Künnemann 2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021 | 4 | 2021 |
| Advancing security protocol verification: A journey along the boundaries of the symbolic model A Dax Saarländische Universitäts-und Landesbibliothek, 2025 | | 2025 |
| List of External Reviewers CSF 2021 (all submission cycles) C Abate, AA de Amorim, T Antonopoulos, C Badertscher, G Battiston, ... | | |
| CSF 2019 M Algehed, A Russo, C Flanagan, P Vasilikos, HR Nielson, F Nielson, ... | | |