| The provable security of ed25519: theory and practice J Brendel, C Cremers, D Jackson, M Zhao 2021 IEEE Symposium on Security and Privacy (SP), 1659-1676, 2021 | 127 | 2021 |
| FIDO2, CTAP 2.1, and WebAuthn 2: Provable security and post-quantum instantiation N Bindel, C Cremers, M Zhao 2023 IEEE Symposium on Security and Privacy (SP), 1471-1490, 2023 | 43 | 2023 |
| Automated Analysis of Protocols that use Authenticated Encryption: How Subtle {AEAD} Differences can impact Protocol Security C Cremers, A Dax, C Jacomme, M Zhao 32nd USENIX Security Symposium (USENIX Security 23), 5935-5952, 2023 | 17 | 2023 |
| Factorization of frieze patterns M Weber, M Zhao arXiv preprint arXiv:1809.00274, 2018 | 15 | 2018 |
| Automated analysis of protocols that use authenticated encryption: Analysing the impact of the subtle differences between aeads on protocol security C Cremers, A Dax, C Jacomme, M Zhao USENIX Security, 2023 | 6 | 2023 |
| ETK: External-Operations TreeKEM and the Security of MLS in RFC 9420 C Cremers, E Günsay, V Wesselkamp, M Zhao Cryptology ePrint Archive, 2025 | 5 | 2025 |
| Multi-stage group key distribution and pakes: Securing zoom groups against malicious servers without new security elements C Cremers, E Ronen, M Zhao 2024 IEEE Symposium on Security and Privacy (SP), 2686-2704, 2024 | 4 | 2024 |
| An extended hierarchy of security notions for threshold signature schemes and automated analysis of protocols that use them C Cremers, A Peltonen, M Zhao Cryptology ePrint Archive, 2024 | 4 | 2024 |
| Provably Post-Quantum Secure Messaging with Strong Compromise Resilience and Immediate Decryption. C Cremers, M Zhao IACR Cryptol. ePrint Arch. 2022, 1481, 2022 | 4 | 2022 |
| Secure messaging with strong compromise resilience, temporal privacy, and immediate decryption C Cremers, M Zhao 2024 IEEE Symposium on Security and Privacy (SP), 2591-2609, 2024 | 3 | 2024 |
| Provable security and real-world protocols: theory and practice M Zhao Saarländische Universitäts-und Landesbibliothek, 2023 | 1 | 2023 |