Hello! My list of publications is as follows:
- Secure Handover Schemes (2025) Rabiah Alnashwan, Benjamin Dowling and Bhagya Wimalasiri. To Appear In 38th IEEE Computer Security Foundations Symposium (CSF 2025).
- UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience (Full version) Rabiah Alnashwan, Prosanta Gope, and Benjamin Dowling. In the 25th Privacy Enhancing Technologies Symposium (PoPETS 2025).
- Cryptography is Rocket Science: Analysis of BPSec (Full version) Benjamin Dowling, Britta Hale, Xisen Tian and Bhagya Wimalasiri. In Communications in Cryptography Vol 1 Issue 4 (CiC 2024).
- Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix’ Core (Full Version) Martin R Albrecht, Benjamin Dowling, and Daniel Jones. In IEEE Symposium on Security and Privacy (S&P, 2024).
- Quantum-Secure Hybrid Communication for Aviation Infrastructure (Full version) Benjamin Dowling and Bhagya Wimalasiri. In Transactions on Dependable and Secure Computing (TDSC 2024).
- Practically-exploitable Cryptographic Vulnerabilities in Matrix (Full Version) Martin R Albrecht, Sofía Celi, Benjamin Dowling, and Daniel Jones. IEEE Symposium on Security and Privacy (S&P, 2023)
- Privacy-aware secure region-based handover for small cell networks in 5G-enabled mobile communication (Full Version) Rabiah Alnashwan, Prosanta Gope, and Benjamin Dowling. In IEEE Transactions on Information Forensics and Security (IEEE TIFS, 2023)
- Strongly anonymous ratcheted key exchange (Full version) Benjamin Dowling, Eduard Hauck, Doreen Riepel, and Paul Rösler. In International Conference on the Theory and Application of Cryptology and Information Security. (AsiaCrypt 2022)
- Post Quantum Noise (Full version) Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, and Fiona Weber In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS 2022)
- Continuous authentication in secure messaging (Full version) Benjamin Dowling, Felix Günther and Alexandre Poirrer. In European Symposium on Research in Computer Security (ESORICS 2022).
- Secure Messaging Authentication against Active Man-in-the-Middle Attacks (Full version) Benjamin Dowling and Britta Hale. In Proc. of the 6th IEEE European Symposium on Security and Privacy (EuroS&P 2021).
- A Cryptographic Analysis of the TLS 1.3 Handshake Protocol (Full version) Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila. In Journal of Cryptology (JoC 2021).
- Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6. (Full version) Haibat Khan, Benjamin Dowling and Keith M Martin. In The International Journal of Information Security, (IJIS 2021).
- Flexible authenticated and confidential channel establishment (fACCE): Analyzing the Noise protocol framework (Full version) Benjamin Dowling, Paul Rösler, and Jörg Schwenk. In Proc. of The IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2020)
- A Formal Security Analysis of Key Establishment in the Signal Messaging Protocol. (Full version) Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas Stebila. In Journal of Cryptology (JoC 2020).
- Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange (Full version) Benjamin Dowling and Torben Brandt Hansen and Kenneth G. Paterson. In Post-Quantum Cryptography Conference (PQC 2020).
- Identity Confidentiality in 5G Mobile Telephony Systems (Full version) Haibat Khan, Benjamin Dowling and Keith M. Martin. In Proc. of 4th International Conference on Security Standardisation Research. (SSR 2018)
- Highly efficient privacy preserving key agreement for wireless body area networks. Haibat Khan, Benjamin Dowling and Keith M. Martin. In Proc. of the 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustComm 2018).
- A Cryptographic Analysis of the WireGuard Protocol (Full version) Benjamin Dowling and Kenneth G. Paterson. In Proc. of the 16th International Conference on Applied Cryptography and Network Security (ACNS 2018)
- A Formal Analysis of the Signal Messaging Protocol (Full version) Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt and Douglas Stebila. In Proc. of 2nd European Symposium on Security and Privacy (EuroS&P 2017)
- Secure Logging Schemes and Certificate Transparency (Full version) Benjamin Dowling, Felix Günther, Udyani Herath and Douglas Stebila. In Proc. of 21st European Symposium on Research in Computer Security (ESORICS 2016)
- Authenticated Network Time Synchronization. (Full version) Benjamin Dowling, Douglas Stebila and Greg Zaverucha. In Proc. of 25th USENIX Security Symposium (USENIXSec 2016).
- A cryptographic analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol. (Full version) Benjamin Dowling, Felix Günther, Marc Fischlin, and Douglas Stebila. Presented at TLS 1.3 Ready or Not Workshop (TRON 2016)
- A cryptographic analysis of the TLS 1.3 handshake protocol candidates. (Full version) Benjamin Dowling, Felix Günther, Marc Fischlin, and Douglas Stebila. In Proc. of 22nd ACM Conference on Computer and Communications Security (CCS 2015)
- Modelling ciphersuite and version negotiation in the TLS protocol. (Full version) Benjamin Dowling, and Douglas Stebila. In Proc. of 20th Australasian Conference on Information Security and Privacy (ACISP 2015)
- Multi-ciphersuite security of the Secure Shell (SSH) protocol. (Full version) Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk and Douglas Stebila. In Proc. of 21st ACM Conference on Computer and Communications Security (CCS 2014)
My presentations are as follows:
- Secure Messaging Authentication against Active Man-in-the-Middle Attacks, EuroS&P 2021, Remote Conference.
- Many a Mickle Makes a Muckle, PQCrypto 2020, Remote Conference.
- Many a Mickle Makes a Muckle, PQCrypto 2020, Remote Conference.
- Many a Mickle Makes a Muckle, ISG Research Seminar Royal Holloway, UK.
- The Signal Messaging Protocol, VMI Summer Retreat, Interlacken, Switzerland, 2019/06.
- Identity Confidentiality in 5G – Invited Talk to Toshiba Research Europe Ltd, Cambridge, UK on 2018/12.
- Identity Confidentiality in 5G – SSR 2019 presentation, Darmstadt Germany on 2018/11.
- A Cryptographic Analysis of the WireGuard Protocol – ACNS 2018 presentation at Leuven, Belgium on 2018/07.
- Formal Analysis of WPA2/3 – The Systematic Analysis of Security Protocol Implementations workshop in Leiden, The Netherlands on 2018/06.
- A Cryptographic Analysis of the WireGuard Protocol – SK3CH, Bertinoro, Italy on 2018/06.
- The miTLS Key Exchange Framework – SKECH2 presentation at Bertinoro, Italy on 2017/07.
- Authenticated Network Time Synchronization – USENIX Security 2016 presentation on 2016/08.
- Modern Key-Exchange Models – Invited talk at Microsoft Research Cambridge on 2016/04.
- Filling in the Gaps: Modelling Negotiation in the TLS Protocol – Invited talk at Technische Universitat Darmstadt on 2015/09.
- Provable Security of Practical Internet Protocols – QUT’s Science and Engineering 3 Minute Thesis Competition on 2015/08 (Runner up)
- Modelling ciphersuite and version negotiation in the TLS Protocol – ACISP Presentation on 2015/06.
Recent Comments