1. Yasemin Acar et al. 2017 . Comparing the Usability of Cryptographic APIs. In IEEE Symposium on Security and Privacy. 154–171 . Yasemin Acar et al. 2017. Comparing the Usability of Cryptographic APIs. In IEEE Symposium on Security and Privacy. 154–171.
2. Devdatta Akhawe et al. 2010. Towards a Formal Foundation of Web Security . In 23rd IEEE Computer Security Foundations Symposium. 290–304 . https://doi.org/10.1109/CSF. 2010 .27 10.1109/CSF.2010.27 Devdatta Akhawe et al. 2010. Towards a Formal Foundation of Web Security. In 23rd IEEE Computer Security Foundations Symposium. 290–304. https://doi.org/10.1109/CSF.2010.27
3. Amit Seal Ami etal 2021. Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. CoRR abs/2107.07065(2021). Amit Seal Ami et al. 2021. Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. CoRR abs/2107.07065(2021).
4. Jenny Blessing Michael A. Specter and Daniel J. Weitzner. 2021. You Really Shouldn’t Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries. CoRR abs/2107.04940(2021). Jenny Blessing Michael A. Specter and Daniel J. Weitzner. 2021. You Really Shouldn’t Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries. CoRR abs/2107.04940(2021).
5. Maximilian Blochberger , Tom Petersen , and Hannes Federrath . 2019. Mitigating Cryptographic Mistakes by Design . In Mensch und Computer 2019 . https://doi.org/10.18420/muc2019-ws-302-02 10.18420/muc2019-ws-302-02 Maximilian Blochberger, Tom Petersen, and Hannes Federrath. 2019. Mitigating Cryptographic Mistakes by Design. In Mensch und Computer 2019. https://doi.org/10.18420/muc2019-ws-302-02