-
2
-
-
0032669778
-
Transport layer security: How much does it really cost?
-
A. K. Choudhury and N. Shroff, Eds. IEEE
-
APOSTOLOPOULOS, G., PERIS, V., AND SAHA, D. 1999. Transport layer security: How much does it really cost? In Proceedings of IEEE Infocom '99, A. K. Choudhury and N. Shroff, Eds. IEEE, 717-725.
-
(1999)
Proceedings of IEEE Infocom '99
, pp. 717-725
-
-
Apostolopoulos, G.1
Peris, V.2
Saha, D.3
-
3
-
-
0034228518
-
Securing electronic commerce: Reducing the SSL overhead
-
July
-
APOSTOLOPOULOS, G., PERIS, V., PRADHAN, P., AND SAHA, D. 2000. Securing electronic commerce: Reducing the SSL overhead. IEEE Netw. 14, 4 (July), 8-16.
-
(2000)
IEEE Netw.
, vol.14
, Issue.4
, pp. 8-16
-
-
Apostolopoulos, G.1
Peris, V.2
Pradhan, P.3
Saha, D.4
-
4
-
-
14544273309
-
-
BLAKE-WILSON, S., NYSTROM, M., HOPWOOD, D., MIKKELSEN, J., AND WRIGHT, T. 2003. RFC 3546: TLS Extensions.
-
(2003)
RFC 3546: TLS Extensions
-
-
Blake-Wilson, S.1
Nystrom, M.2
Hopwood, D.3
Mikkelsen, J.4
Wright, T.5
-
5
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on RSA encryption standard pkcs #1
-
H. Krawczyk, Ed. Lecture Notes in Computer Science. Springer-Verlag, Berlin
-
BLEICHENBACHER, D. 1998. Chosen ciphertext attacks against protocols based on RSA encryption standard pkcs #1. In Proceedings of Crypto 1998, H. Krawczyk, Ed. Lecture Notes in Computer Science, vol. 1462. Springer-Verlag, Berlin, 1-12.
-
(1998)
Proceedings of Crypto 1998
, vol.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
6
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
BLOOM, B. 1970. Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 7, 422-6.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
7
-
-
14544279406
-
Analysis of the SSL protocol
-
Department of Computer Science, University of Bristol
-
BRADLEY, J. AND DAVIES, N. 1995. Analysis of the SSL protocol. Tech. Rep. CSTR-95-021, Department of Computer Science, University of Bristol.
-
(1995)
Tech. Rep.
, vol.CSTR-95-021
-
-
Bradley, J.1
Davies, N.2
-
9
-
-
35248836120
-
Password interception in a SSL/TLS channel
-
D. Boneh, Ed. Lecture Notes in Computer Science. Springer-Verlag, Berlin
-
CANVEL, B., HILTGEN, A., VAUDENAY, S., AND VUAGNOUX, M. 2003. Password interception in a SSL/TLS channel. In Proceedings of Crypto 2003, D. Boneh, Ed. Lecture Notes in Computer Science, vol. 2729. Springer-Verlag, Berlin, 583-599.
-
(2003)
Proceedings of Crypto 2003
, vol.2729
, pp. 583-599
-
-
Canvel, B.1
Hiltgen, A.2
Vaudenay, S.3
Vuagnoux, M.4
-
10
-
-
85094920316
-
Performance analysis of TLS web servers
-
M. Tripunitara, Ed. Internet Society
-
COARFA, C., DRUSCHEL, P., AND WALLACH, D. 2002. Performance analysis of TLS web servers. In Proceedings of NDSS 2002, M. Tripunitara, Ed. Internet Society, 183-194.
-
(2002)
Proceedings of NDSS 2002
, pp. 183-194
-
-
Coarfa, C.1
Druschel, P.2
Wallach, D.3
-
12
-
-
0018443381
-
Privacy and authentication: An introduction to cryptography
-
DIFFIE, W. AND HELLMAN, M. 1979. Privacy and authentication: An introduction to cryptography. Proc. IEEE 67, 397-427.
-
(1979)
Proc. IEEE
, vol.67
, pp. 397-427
-
-
Diffie, W.1
Hellman, M.2
-
13
-
-
33646755342
-
Secure web server performance dramatically improved by caching SSL session keys
-
P. Cao and S. Sarukkai, Eds.
-
GOLDBERG, A., BUFF, R., AND SCHMITT, A. 1998. Secure web server performance dramatically improved by caching SSL session keys. In Proceedings of WISP 1998, P. Cao and S. Sarukkai, Eds.
-
(1998)
Proceedings of WISP 1998
-
-
Goldberg, A.1
Buff, R.2
Schmitt, A.3
-
14
-
-
85180529073
-
Speeding up secure web transactions using elliptic curve cryptography
-
M. Tripunitara, Ed. Internet Society
-
GUPTA, V., STEBILA, D., FUNG, S., SHANTZ, S.C., GURA, N., AND EBERLE, H. 2004. Speeding up secure web transactions using elliptic curve cryptography. In Proceedings of NDSS '04, M. Tripunitara, Ed. Internet Society.
-
(2004)
Proceedings of NDSS '04
-
-
Gupta, V.1
Stebila, D.2
Fung, S.3
Shantz, S.C.4
Gura, N.5
Eberle, H.6
-
15
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
N. Koblitz, Ed. Lecture Notes in Computer Science. Springer-Verlag, Berlin
-
KOCHER, P. 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Proceedings of Crypto 1996, N. Koblitz, Ed. Lecture Notes in Computer Science, vol. 1109. Springer-Verlag, Berlin, 104-113.
-
(1996)
Proceedings of Crypto 1996
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
16
-
-
84880901653
-
The order of encryption and authentication for protecting communications
-
J. Killian, Ed. Lecture Notes in Computer Science. Springer-Verlag, Berlin
-
KRAWCZYK, H. 2001. The order of encryption and authentication for protecting communications. In Proceedings of Crypto 2001, J. Killian, Ed. Lecture Notes in Computer Science, vol. 2139. Springer-Verlag, Berlin, 310-31.
-
(2001)
Proceedings of Crypto 2001
, vol.2139
, pp. 310-331
-
-
Krawczyk, H.1
-
17
-
-
85084160482
-
Finite-state analysis of SSL 3.0
-
A. Rubin, Ed. USENIX
-
MITCHELL, J., SHMATIKOV, V., AND STERN, U. 1998. Finite-state analysis of SSL 3.0. In Proceedings of USENIX Security 1998, A. Rubin, Ed. USENIX, 201-216.
-
(1998)
Proceedings of USENIX Security 1998
, pp. 201-216
-
-
Mitchell, J.1
Shmatikov, V.2
Stern, U.3
-
19
-
-
85024252307
-
Inductive analysis of the internet protocol TLS
-
PAULSON, L. C. 1999. Inductive analysis of the internet protocol TLS. ACM Trans. Informat. Syst. Secur. 2, 3, 332-51.
-
(1999)
ACM Trans. Informat. Syst. Secur.
, vol.2
, Issue.3
, pp. 332-351
-
-
Paulson, L.C.1
-
20
-
-
85084160511
-
SSLACC: A clustered SSL accelerator
-
D. Boneh, Ed. USENIX
-
RESCORLA, E., CAIN, A., AND KORVER, B. 2002. SSLACC: A clustered SSL accelerator. In Proceedings of USENIX Security 2002, D. Boneh, Ed. USENIX, 229-246.
-
(2002)
Proceedings of USENIX Security 2002
, pp. 229-246
-
-
Rescorla, E.1
Cain, A.2
Korver, B.3
-
25
-
-
84947212539
-
Security flaws induced by CBC padding - Applications to SSL, IPSEC, WTLS
-
L. Knudsen, Ed. Lecture Notes in Computer Science. Springer-Verlag, Berlin
-
VAUDENAY, S. 2002. Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS . . . In Proceedings of Eurocrypt 2002, L. Knudsen, Ed. Lecture Notes in Computer Science, vol. 2332. Springer-Verlag, Berlin, 534-545.
-
(2002)
Proceedings of Eurocrypt 2002
, vol.2332
, pp. 534-545
-
-
Vaudenay, S.1
|