| A formal security analysis of the signal messaging protocol K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila Journal of Cryptology 33 (4), 1914-1983, 2020 | 596 | 2020 |
| A cryptographic analysis of the TLS 1.3 handshake protocol candidates B Dowling, M Fischlin, F Günther, D Stebila Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 197 | 2015 |
| A cryptographic analysis of the TLS 1.3 handshake protocol B Dowling, M Fischlin, F Günther, D Stebila Journal of Cryptology 34 (4), 37, 2021 | 143 | 2021 |
| Secure logging schemes and certificate transparency B Dowling, F Günther, U Herath, D Stebila European Symposium on Research in Computer Security, 140-158, 2016 | 80 | 2016 |
| A cryptographic analysis of the WireGuard protocol B Dowling, KG Paterson International Conference on Applied Cryptography and Network Security, 3-21, 2018 | 76 | 2018 |
| A cryptographic analysis of the TLS 1.3 draft-10 full and pre-shared key handshake protocol B Dowling, M Fischlin, F Günther, D Stebila Cryptology ePrint Archive, 2016 | 61 | 2016 |
| Many a mickle makes a muckle: A framework for provably quantum-secure hybrid key exchange B Dowling, TB Hansen, KG Paterson International Conference on Post-Quantum Cryptography, 483-502, 2020 | 55 | 2020 |
| Multi-ciphersuite security of the Secure Shell (SSH) protocol F Bergsma, B Dowling, F Kohlar, J Schwenk, D Stebila Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 54 | 2014 |
| Authenticated network time synchronization B Dowling, D Stebila, G Zaverucha 25th USENIX security symposium (USENIX security 16), 823-840, 2016 | 49 | 2016 |
| Identity confidentiality in 5G mobile telephony systems H Khan, B Dowling, KM Martin International Conference on Research in Security Standardisation, 120-142, 2018 | 44 | 2018 |
| Practically-exploitable cryptographic vulnerabilities in matrix MR Albrecht, S Celi, B Dowling, D Jones 2023 IEEE Symposium on Security and Privacy (SP), 164-181, 2023 | 43 | 2023 |
| Secure messaging authentication against active man-in-the-middle attacks B Dowling, B Hale 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 54-70, 2021 | 38* | 2021 |
| Post quantum noise Y Angel, B Dowling, A Hülsing, P Schwabe, F Weber Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 31 | 2022 |
| Flexible authenticated and confidential channel establishment (fACCE): Analyzing the noise protocol framework B Dowling, P Rösler, J Schwenk IACR International Conference on Public-Key Cryptography, 341-373, 2020 | 29 | 2020 |
| Privacy-aware secure region-based handover for small cell networks in 5G-enabled mobile communication R Alnashwan, P Gope, B Dowling IEEE Transactions on Information Forensics and Security 18, 1898-1913, 2023 | 26 | 2023 |
| Modelling ciphersuite and version negotiation in the TLS protocol B Dowling, D Stebila Australasian Conference on Information Security and Privacy, 270-288, 2015 | 26 | 2015 |
| Practical (post-quantum) key combiners from one-wayness and applications to TLS N Aviram, B Dowling, I Komargodski, KG Paterson, E Ronen, E Yogev Cryptology ePrint Archive, 2022 | 19 | 2022 |
| Highly efficient privacy-preserving key agreement for wireless body area networks H Khan, B Dowling, KM Martin 2018 17th IEEE international conference on trust, security and privacy in …, 2018 | 18 | 2018 |
| Strongly anonymous ratcheted key exchange B Dowling, E Hauck, D Riepel, P Rösler International Conference on the Theory and Application of Cryptology and …, 2022 | 16 | 2022 |
| Continuous authentication in secure messaging B Dowling, F Günther, A Poirrier European Symposium on Research in Computer Security, 361-381, 2022 | 15 | 2022 |