From 37e00d0f9af7fbf94fd50120d6e37a53ff3afac1a40a9803d1f7b9a2b84e2d8f Mon Sep 17 00:00:00 2001 From: Nadim Kobeissi Date: Wed, 2 Jul 2025 11:26:12 +0200 Subject: [PATCH] Fix typo --- website/index.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/website/index.html b/website/index.html index 8338c48..0fe18d6 100755 --- a/website/index.html +++ b/website/index.html @@ -198,7 +198,7 @@
  • Christina Garman, Kenneth G. Paterson and Thyla Van der Merwe, Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS, USENIX Security Symposium, 2015.
  • Nadim Kobeissi, Karthikeyan Bhargavan and Bruno Blanchet, Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic and Computational Approach, IEEE European Symposium on Security and Privacy, 2017.
  • Théophile Wallez, A Verification Framework for Secure Group Messaging, PSL Université Paris, 2025.
  • -
  • Ksenia Ermoshina, Harry Halpin, Francesca Musiani, Can Johnny Build a Protocol? Co-ordinating Developer and User Intentions for Privacy-Enhanced Secure Messaging Protocols, European Workshop on Systems Security, 2017.
  • +
  • Ksenia Ermoshina, Harry Halpin and Francesca Musiani, Can Johnny Build a Protocol? Co-ordinating Developer and User Intentions for Privacy-Enhanced Secure Messaging Protocols, European Workshop on Systems Security, 2017.
  • Greg Aloupis, Erik D. Demaine, Alan Guo and Giovanni Viglietta, Classic Nintendo Games are (Computationally) Hard, ACM Theoretical Computer Science, 2015.
  • Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G. Paterson, Narseo Vallina-Rodriguez and Juan Caballero, Coming of Age: A Longitudinal Study of TLS Deployment, ACM IMC, 2018.
  • Hugo Krawczyk, Cryptographic Extraction and Key Derivation: The HKDF Scheme, IACR Crypto, 2010.
  • @@ -518,7 +518,7 @@