Efficient padding oracle attacks on cryptographic hardware R Bardou, R Focardi, Y Kawamoto, L Simionato, G Steel, JK Tsay Annual Cryptology Conference, 608-625, 2012 | 113 | 2012 |
Attacking and fixing PKCS# 11 security tokens M Bortolozzo, M Centenaro, R Focardi, G Steel Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 113 | 2010 |
Formal analysis of protocols based on TPM state registers S Delaune, S Kremer, MD Ryan, G Steel 2011 IEEE 24th Computer Security Foundations Symposium, 66-80, 2011 | 70 | 2011 |
Formal analysis of PKCS# 11 S Delaune, S Kremer, G Steel 2008 21st IEEE Computer Security Foundations Symposium, 331-344, 2008 | 66 | 2008 |
A formal analysis of authentication in the TPM S Delaune, S Kremer, MD Ryan, G Steel International Workshop on Formal Aspects in Security and Trust, 111-125, 2010 | 59 | 2010 |
Formal analysis of privacy for vehicular mix-zones M Dahl, S Delaune, G Steel European Symposium on Research in Computer Security, 55-70, 2010 | 54 | 2010 |
Automatic analysis of the security of XOR-based key management schemes V Cortier, G Keighren, G Steel International Conference on Tools and Algorithms for the Construction and …, 2007 | 49 | 2007 |
Formal security analysis of PKCS# 11 and proprietary extensions S Delaune, S Kremer, G Steel Journal of Computer Security 18 (6), 1211-1245, 2010 | 46 | 2010 |
Analysing PKCS# 11 key management APIs with unbounded fresh data S Fröschle, G Steel Joint Workshop on Automated Reasoning for Security Protocol Analysis and …, 2009 | 45 | 2009 |
Formal analysis of PIN block attacks G Steel Theoretical Computer Science 367 (1-2), 257-270, 2006 | 45 | 2006 |
YubiSecure? Formal security analysis results for the Yubikey and YubiHSM R Künnemann, G Steel International Workshop on Security and Trust Management, 257-272, 2012 | 36 | 2012 |
Type-based analysis of PIN processing APIs M Centenaro, R Focardi, FL Luccio, G Steel European Symposium on Research in Computer Security, 53-68, 2009 | 32 | 2009 |
A generic security API for symmetric key management on cryptographic devices V Cortier, G Steel European Symposium on Research in Computer Security, 605-620, 2009 | 31 | 2009 |
Deduction with XOR constraints in security API modelling G Steel International Conference on Automated Deduction, 322-336, 2005 | 29 | 2005 |
Attacking group protocols by refuting incorrect inductive conjectures G Steel, A Bundy Journal of Automated Reasoning 36 (1-2), 149-176, 2006 | 27 | 2006 |
Finding counterexamples to inductive conjectures and discovering security protocol attacks G Steel, A Bundy, E Denney Foundations of Computer Security, 49, 2002 | 27 | 2002 |
Security for key management interfaces S Kremer, G Steel, B Warinschi 2011 IEEE 24th Computer Security Foundations Symposium, 266-280, 2011 | 24 | 2011 |
An introduction to security API analysis R Focardi, FL Luccio, G Steel International School on Foundations of Security Analysis and Design, 35-65, 2011 | 20 | 2011 |
Artificial intelligence and scientific creativity S Colton, G Steel Artificial Intelligence and the Study of Behaviour Quarterly 102, 1999 | 20 | 1999 |
From Computationally-Proved Protocol Specifications to Implementations and Application to SSH. D Cadé, B Blanchet J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4 (1), 4-31, 2013 | 19 | 2013 |