SSO Wars: The Token MenaceCovers SAML signature verification, resolving security keys, token handlers vulnerabilities, and a Sharepoint privilege escalation demo.
Partitioning Oracle AttacksExplores partitioning oracle attacks, multi-key collision resistance, AES-GCM authentication, and simulation results.
Signal: Security AnalysisExplores the formal security analysis of the Signal Messaging Protocol, covering key concepts and highlighting limitations and results.
ECDSA Ring SignatureExplores ring signatures for anonymous feedback collection and introduces the ZK Attest protocol for secure signature verification using zero-knowledge proofs.