Linked Presentation: Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknessesFormal Analysis of SPDM: Security Protocol and Data Model version 1.2Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security