Hello! My list of publications is as follows:
- Secure Messaging Authentication against Active Man-in-the-Middle Attacks (Full version) Benjamin Dowling and Britta Hale. In Proc. of the 6th IEEE European Symposium on Security and Privacy (EuroS&P 2021).
- A Cryptographic Analysis of the TLS 1.3 Handshake Protocol (Full version) Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila. In Journal of Cryptology (JoC 2021).
- Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6. (Full version) Haibat Khan, Benjamin Dowling and Keith M Martin. In The International Journal of Information Security, (IJIS 2021).
- Flexible authenticated and confidential channel establishment (fACCE): Analyzing the Noise protocol framework (Full version) Benjamin Dowling, Paul Rösler, and Jörg Schwenk. In Proc. of The IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2020)
- A Formal Security Analysis of Key Establishment in the Signal Messaging Protocol. (Full version) Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas Stebila. In Journal of Cryptology (JoC 2020).
- Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange (Full version) Benjamin Dowling and Torben Brandt Hansen and Kenneth G. Paterson. In Post-Quantum Cryptography Conference (PQC 2020).
- Identity Confidentiality in 5G Mobile Telephony Systems (Full version) Haibat Khan, Benjamin Dowling and Keith M. Martin. In Proc. of 4th International Conference on Security Standardisation Research. (SSR 2018)
- Highly efficient privacy preserving key agreement for wireless body area networks. Haibat Khan, Benjamin Dowling and Keith M. Martin. In Proc. of the 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustComm 2018).
- A Cryptographic Analysis of the WireGuard Protocol (Full version) Benjamin Dowling and Kenneth G. Paterson. In Proc. of the 16th International Conference on Applied Cryptography and Network Security (ACNS 2018)
- A Formal Analysis of the Signal Messaging Protocol (Full version) Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt and Douglas Stebila. In Proc. of 2nd European Symposium on Security and Privacy (EuroS&P 2017)
- Secure Logging Schemes and Certificate Transparency (Full version) Benjamin Dowling, Felix Günther, Udyani Herath and Douglas Stebila. In Proc. of 21st European Symposium on Research in Computer Security (ESORICS 2016)
- Authenticated Network Time Synchronization. (Full version) Benjamin Dowling, Douglas Stebila and Greg Zaverucha. In Proc. of 25th USENIX Security Symposium (USENIXSec 2016).
- A cryptographic analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol. (Full version) Benjamin Dowling, Felix Günther, Marc Fischlin, and Douglas Stebila. Presented at TLS 1.3 Ready or Not Workshop (TRON 2016)
- A cryptographic analysis of the TLS 1.3 handshake protocol candidates. (Full version) Benjamin Dowling, Felix Günther, Marc Fischlin, and Douglas Stebila. In Proc. of 22nd ACM Conference on Computer and Communications Security (CCS 2015)
- Modelling ciphersuite and version negotiation in the TLS protocol. (Full version) Benjamin Dowling, and Douglas Stebila. In Proc. of 20th Australasian Conference on Information Security and Privacy (ACISP 2015)
- Multi-ciphersuite security of the Secure Shell (SSH) protocol. (Full version) Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk and Douglas Stebila. In Proc. of 21st ACM Conference on Computer and Communications Security (CCS 2014)
My presentations are as follows:
- Secure Messaging Authentication against Active Man-in-the-Middle Attacks, EuroS&P 2021, Remote Conference.
- Many a Mickle Makes a Muckle, PQCrypto 2020, Remote Conference.
- Many a Mickle Makes a Muckle, PQCrypto 2020, Remote Conference.
- Many a Mickle Makes a Muckle, ISG Research Seminar Royal Holloway, UK.
- The Signal Messaging Protocol, VMI Summer Retreat, Interlacken, Switzerland, 2019/06.
- Identity Confidentiality in 5G – Invited Talk to Toshiba Research Europe Ltd, Cambridge, UK on 2018/12.
- Identity Confidentiality in 5G – SSR 2019 presentation, Darmstadt Germany on 2018/11.
- A Cryptographic Analysis of the WireGuard Protocol – ACNS 2018 presentation at Leuven, Belgium on 2018/07.
- Formal Analysis of WPA2/3 – The Systematic Analysis of Security Protocol Implementations workshop in Leiden, The Netherlands on 2018/06.
- A Cryptographic Analysis of the WireGuard Protocol – SK3CH, Bertinoro, Italy on 2018/06.
- The miTLS Key Exchange Framework – SKECH2 presentation at Bertinoro, Italy on 2017/07.
- Authenticated Network Time Synchronization – USENIX Security 2016 presentation on 2016/08.
- Modern Key-Exchange Models – Invited talk at Microsoft Research Cambridge on 2016/04.
- Filling in the Gaps: Modelling Negotiation in the TLS Protocol – Invited talk at Technische Universitat Darmstadt on 2015/09.
- Provable Security of Practical Internet Protocols – QUT’s Science and Engineering 3 Minute Thesis Competition on 2015/08 (Runner up)
- Modelling ciphersuite and version negotiation in the TLS Protocol – ACISP Presentation on 2015/06.
Recent Comments