What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ralf Sasse
Google Scholar
ORCID:
0000-0002-5632-6099
20
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication.
Yang Yang
Guomin Yang
Yingjiu Li
Minming Huang
Zilin Shen
Imtiaz Karim
Ralf Sasse
David A. Basin
Elisa Bertino
Jian Weng
HweeHwa Pang
Robert H. Deng
2025
conf/uss
A Formal Analysis of Apple's iMessage PQ3 Protocol.
Felix Linker
Ralf Sasse
David A. Basin
2023
conf/sp
Sound Verification of Security Protocols: From Design to Interoperable Implementations.
Linard Arquint
Felix A. Wolf
Joseph Lallemand
Ralf Sasse
Christoph Sprenger
Sven N. Wiesner
David A. Basin
Peter Müller
2021
conf/uss
Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions.
David A. Basin
Ralf Sasse
Jorge Toro-Pozo
2021
conf/sp
The EMV Standard: Break, Fix, Verify.
David A. Basin
Ralf Sasse
Jorge Toro-Pozo
2021
conf/wisec
A comprehensive formal analysis of 5G handover.
Aleksi Peltonen
Ralf Sasse
David A. Basin
2020
conf/ccs
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme.
Stephan Wesemeyer
Christopher J. P. Newton
Helen Treharne
Liqun Chen
Ralf Sasse
Jorden Whitefield
2020
conf/ccs
Privacy-Preserving OpenID Connect.
Sven Hammann
Ralf Sasse
David A. Basin
2020
conf/uss
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.
Guillaume Girol
Lucca Hirschi
Ralf Sasse
Dennis Jackson
Cas Cremers
David A. Basin
2020
conf/eurosp
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust.
Laurent Chuat
AbdelRahman Abdou
Ralf Sasse
Christoph Sprenger
David A. Basin
Adrian Perrig
2019
conf/ccs
User Account Access Graphs.
Sven Hammann
Sasa Radomirovic
Ralf Sasse
David A. Basin
2019
conf/ccs
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures.
Dennis Jackson
Cas Cremers
Katriel Cohn-Gordon
Ralf Sasse
2019
conf/eurosp
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation.
Jorden Whitefield
Liqun Chen
Ralf Sasse
Steve A. Schneider
Helen Treharne
Stephan Wesemeyer
2018
conf/ccs
A Formal Analysis of 5G Authentication.
David A. Basin
Jannik Dreier
Lucca Hirschi
Sasa Radomirovic
Ralf Sasse
Vincent Stettler
2015
conf/ccs
Automated Symbolic Proofs of Observational Equivalence.
David A. Basin
Jannik Dreier
Ralf Sasse
2014
conf/ccs
ARPKI: Attack Resilient Public-Key Infrastructure.
David A. Basin
Cas Cremers
Tiffany Hyun-Jin Kim
Adrian Perrig
Ralf Sasse
Pawel Szalachowski
2014
conf/sp
Automated Verification of Group Key Agreement Protocols.
Benedikt Schmidt
Ralf Sasse
Cas Cremers
David A. Basin
2012
conf/esorics
Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions.
Serdar Erbatur
Santiago Escobar
Deepak Kapur
Zhiqiang Liu
Christopher Lynch
Catherine Meadows
José Meseguer
Paliath Narendran
Sonia Santiago
Ralf Sasse
2009
conf/esorics
Model-Checking DoS Amplification for VoIP Session Initiation.
Ravinder Shankesi
Musab AlTurki
Ralf Sasse
Carl A. Gunter
José Meseguer
2007
conf/sp
A Systematic Approach to Uncover Security Flaws in GUI Logic.
José Meseguer
Ralf Sasse
Helen J. Wang
Yi-Min Wang
Coauthors
AbdelRahman Abdou
(1)
Adrian Perrig
(2)
Aleksi Peltonen
(1)
Benedikt Schmidt
(1)
Carl A. Gunter
(1)
Cas Cremers
(4)
Catherine Meadows
(1)
Christoph Sprenger
(2)
Christopher J. P. Newton
(1)
Christopher Lynch
(1)
David A. Basin
(14)
Deepak Kapur
(1)
Dennis Jackson
(2)
Elisa Bertino
(1)
Felix A. Wolf
(1)
Felix Linker
(1)
Guillaume Girol
(1)
Guomin Yang
(1)
Helen J. Wang
(1)
Helen Treharne
(2)
HweeHwa Pang
(1)
Imtiaz Karim
(1)
Jannik Dreier
(2)
Jian Weng
(1)
Jorden Whitefield
(2)
Jorge Toro-Pozo
(2)
José Meseguer
(3)
Joseph Lallemand
(1)
Katriel Cohn-Gordon
(1)
Laurent Chuat
(1)
Linard Arquint
(1)
Liqun Chen
(2)
Lucca Hirschi
(2)
Minming Huang
(1)
Musab AlTurki
(1)
Paliath Narendran
(1)
Pawel Szalachowski
(1)
Peter Müller
(1)
Ralf Sasse
(20)
Ravinder Shankesi
(1)
Robert H. Deng
(1)
Santiago Escobar
(1)
Sasa Radomirovic
(2)
Serdar Erbatur
(1)
Sonia Santiago
(1)
Stephan Wesemeyer
(2)
Steve A. Schneider
(1)
Sven Hammann
(2)
Sven N. Wiesner
(1)
Tiffany Hyun-Jin Kim
(1)
Vincent Stettler
(1)
Yang Yang
(1)
Yi-Min Wang
(1)
Yingjiu Li
(1)
Zhiqiang Liu
(1)
Zilin Shen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to