Abstract is missing.
- hacspec: Towards Verifiable Crypto StandardsKarthikeyan Bhargavan, Franziskus Kiefer, Pierre-Yves Strub. 1-20 [doi]
- Formal Verification of Ephemeral Diffie-Hellman Over COSE (EDHOC)Alessandro Bruni, Thorvald Sahl Jørgensen, Theis Grønbech Petersen, Carsten Schürmann. 21-36 [doi]
- Experimental Evaluation of Attacks on TESLA-Secured Time Synchronization ProtocolsKristof Teichel, Gregor Hildermeier. 37-55 [doi]
- Co-ordinating Developers and High-Risk Users of Privacy-Enhanced Secure Messaging ProtocolsHarry Halpin, Ksenia Ermoshina, Francesca Musiani. 56-75 [doi]
- Building Blocks in Standards: Improving Consistency in Standardization with Ontology and ReasoningMarcello Balduccini, Claire Vishik. 76-94 [doi]
- Defeating the Downgrade Attack on Identity Privacy in 5GMohsin Khan, Philip Ginzboorg, Kimmo Järvinen 0001, Valtteri Niemi. 95-119 [doi]
- Identity Confidentiality in 5G Mobile Telephony SystemsHaibat Khan, Benjamin Dowling, Keith M. Martin. 120-142 [doi]
- Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & CertificationDarren Hurley-Smith, Julio Hernandez-Castro. 143-163 [doi]
- The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third PartyJohn Kelsey. 164-184 [doi]