1. Secrecy by typing in security protocols
2. Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
3. A Machine-Checked Proof of Security for AWS Key Management Service
4. Nimrod Aviram , Sebastian Schinzel , Juraj Somorovsky , Nadia Heninger , Maik Dankel , Jens Steube , Luke Valenta , David Adrian , J Alex Halderman , and Viktor Dukhovni . 2016 . DROWN: Breaking TLS using sslv2 . In 25th USENIX Security Symposium (USENIX Security 16) . 689–706. Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J Alex Halderman, and Viktor Dukhovni. 2016. DROWN: Breaking TLS using sslv2. In 25th USENIX Security Symposium (USENIX Security 16). 689–706.
5. Computational probabilistic noninterference