Linked Presentation: Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknessesFormal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to ConversationsFormal Analysis of SPDM: Security Protocol and Data Model version 1.2Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security