Benjamin Dowling

Orcid: 0000-0003-3234-6527

Affiliations:
  • University of Sheffield, UK


According to our database1, Benjamin Dowling authored at least 35 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Key Establishment in the Space Environment.
CoRR, March, 2025

Quantum-Secure Hybrid Communication for Aviation Infrastructures.
IEEE Trans. Dependable Secur. Comput., 2025

PGUP: Pretty Good User Privacy for 5G-enabled Secure Mobile Communication Protocols.
Proc. Priv. Enhancing Technol., 2025

Post-Quantum Cryptographic Analysis of SSH.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Formal Analysis of Multi-device Group Messaging in WhatsApp.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers.
Proceedings of the 38th IEEE Computer Security Foundations Symposium, 2025

2024
Quantum-Secure Hybrid Communication for Aviation Infrastructure.
IACR Cryptol. ePrint Arch., 2024

Cryptography is Rocket Science: Analysis of BPSec.
IACR Commun. Cryptol., 2024

Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix' Core.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

UniHand: Privacy-Preserving Universal Handover for Small-Cell Networks in 5G-Enabled Mobile Communication with KCI Resilience.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2023
Privacy-Aware Secure Region-Based Handover for Small Cell Networks in 5G-Enabled Mobile Communication.
IEEE Trans. Inf. Forensics Secur., 2023

Authenticated Continuous Key Agreement: Active MitM Detection and Prevention.
IACR Cryptol. ePrint Arch., 2023

Practically-exploitable Cryptographic Vulnerabilities in Matrix.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS.
IACR Cryptol. ePrint Arch., 2022

Continuous Authentication in Secure Messaging.
Proceedings of the Computer Security - ESORICS 2022, 2022

Post Quantum Noise.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Strongly Anonymous Ratcheted Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Secure Messaging Authentication against Active Man-in-the-Middle Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6.
IACR Cryptol. ePrint Arch., 2020

There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging.
IACR Cryptol. ePrint Arch., 2020

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol.
IACR Cryptol. ePrint Arch., 2020

Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

2019
CATH: expanding the horizons of structure-based functional annotations for genome sequences.
Nucleic Acids Res., 2019

2018
Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Identity Confidentiality in 5G Mobile Telephony Systems.
Proceedings of the Security Standardisation Research - 4th International Conference, 2018

A Cryptographic Analysis of the WireGuard Protocol.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
A Formal Security Analysis of the Signal Messaging Protocol.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
IACR Cryptol. ePrint Arch., 2016

Authenticated Network Time Synchronization.
Proceedings of the 25th USENIX Security Symposium, 2016

Secure Logging Schemes and Certificate Transparency.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Modelling Ciphersuite and Version Negotiation in the TLS Protocol.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Multi-ciphersuite security and the SSH protocol.
IACR Cryptol. ePrint Arch., 2013


  Loading...