Efficient padding oracle attacks on cryptographic hardware R Bardou, R Focardi, Y Kawamoto, L Simionato, G Steel, JK Tsay Annual Cryptology Conference, 608-625, 2012 | 144 | 2012 |
Attacking and fixing PKCS# 11 security tokens M Bortolozzo, M Centenaro, R Focardi, G Steel Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 135 | 2010 |
Formal analysis of PKCS# 11 S Delaune, S Kremer, G Steel 2008 21st IEEE Computer Security Foundations Symposium, 331-344, 2008 | 80 | 2008 |
Formal analysis of protocols based on TPM state registers S Delaune, S Kremer, MD Ryan, G Steel 2011 IEEE 24th Computer Security Foundations Symposium, 66-80, 2011 | 77 | 2011 |
A formal analysis of authentication in the TPM S Delaune, S Kremer, MD Ryan, G Steel International Workshop on Formal Aspects in Security and Trust, 111-125, 2010 | 63 | 2010 |
YubiSecure? Formal security analysis results for the Yubikey and YubiHSM R Künnemann, G Steel Security and Trust Management: 8th International Workshop, STM 2012, Pisa …, 2013 | 61 | 2013 |
Formal analysis of privacy for vehicular mix-zones M Dahl, S Delaune, G Steel Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 56 | 2010 |
Formal analysis of PIN block attacks G Steel Theoretical Computer Science 367 (1-2), 257-270, 2006 | 52 | 2006 |
Formal security analysis of PKCS# 11 and proprietary extensions S Delaune, S Kremer, G Steel Journal of Computer Security 18 (6), 1211-1245, 2010 | 51 | 2010 |
Automatic analysis of the security of XOR-based key management schemes V Cortier, G Keighren, G Steel International Conference on Tools and Algorithms for the Construction and …, 2007 | 49 | 2007 |
Analysing PKCS# 11 key management APIs with unbounded fresh data S Fröschle, G Steel Joint Workshop on Automated Reasoning for Security Protocol Analysis and …, 2009 | 48 | 2009 |
Type-based analysis of PIN processing APIs M Centenaro, R Focardi, FL Luccio, G Steel Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 39 | 2009 |
A generic security API for symmetric key management on cryptographic devices V Cortier, G Steel Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 32 | 2009 |
Attacking group protocols by refuting incorrect inductive conjectures G Steel, A Bundy Journal of Automated Reasoning 36, 149-176, 2006 | 28 | 2006 |
Deduction with XOR constraints in security API modelling G Steel International Conference on Automated Deduction, 322-336, 2005 | 28 | 2005 |
Finding counterexamples to inductive conjectures and discovering security protocol attacks G Steel, A Bundy, E Denney Proceedings of 2002 Workshop on Foundations of Computer Security, 49-58, 2002 | 28 | 2002 |
Security analysis of the W3C web cryptography API K Cairns, H Halpin, G Steel Security Standardisation Research: Third International Conference, SSR 2016 …, 2016 | 27 | 2016 |
Artificial intelligence and scientific creativity S Colton, G Steel Artificial Intelligence and the Study of Behaviour Quarterly 102, 1999 | 27 | 1999 |
Security for key management interfaces S Kremer, G Steel, B Warinschi 2011 IEEE 24th Computer Security Foundations Symposium, 266-280, 2011 | 26 | 2011 |
An introduction to security API analysis R Focardi, FL Luccio, G Steel International School on Foundations of Security Analysis and Design, 35-65, 2011 | 23 | 2011 |