-
1
-
-
34548737451
-
Cryptographically sound security proofs for basic and public-key Kerberos
-
Springer
-
M. Backes, I. Cervesato, A. D. Jaggard, A. Scedrov, and J.-K. Tsay. Cryptographically sound security proofs for basic and public-key Kerberos. In ESORICS '06. Springer, 2006.
-
(2006)
ESORICS '06
-
-
Backes, M.1
Cervesato, I.2
Jaggard, A.D.3
Scedrov, A.4
Tsay, J.-K.5
-
2
-
-
4944234643
-
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
-
IEEE
-
M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In CSFW '04. IEEE, 2004.
-
(2004)
CSFW '04
-
-
Backes, M.1
Pfitzmann, B.2
-
3
-
-
1442292329
-
A composable cryptographic library with nested operations
-
ACM
-
M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations. In CCS '03. ACM, 2003.
-
(2003)
CCS '03
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
4
-
-
3543098326
-
Symmetric authentication within a simulatable cryptographic library
-
Springer
-
M. Backes, B. Pfitzmann, and M. Waidner. Symmetric authentication within a simulatable cryptographic library. In ESORICS '03. Springer, 2003.
-
(2003)
ESORICS '03
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
5
-
-
22444455879
-
Kerberos version 4: Inductive analysis of the secrecy goals
-
Springer
-
G. Bella and L. C. Paulson. Kerberos version 4: Inductive analysis of the secrecy goals. In ESORICS '98. Springer, 1998.
-
(1998)
ESORICS '98
-
-
Bella, G.1
Paulson, L.C.2
-
6
-
-
3042537645
-
Formal analysis of the Kerberos authentication system
-
G. Bella and E. Riccobene. Formal analysis of the Kerberos authentication system. Journal of Universal Computer Science, 3(12):1337-1381, 1997.
-
(1997)
Journal of Universal Computer Science
, vol.3
, Issue.12
, pp. 1337-1381
-
-
Bella, G.1
Riccobene, E.2
-
7
-
-
38549138054
-
New proofs for NMAC and HMAC: Security without collision-resistance
-
M. Bellare. New proofs for NMAC and HMAC: Security without collision-resistance. In CRYPTO, 2006.
-
(2006)
CRYPTO
-
-
Bellare, M.1
-
8
-
-
0002757750
-
Keying hash functions for message authentication
-
Springer
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In CRYPTO '96. Springer, 1996.
-
(1996)
CRYPTO '96
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
10
-
-
0003372190
-
The security of the cipher block chaining message authentication code
-
Springer
-
M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. In CRYPTO '04. Springer, 2004.
-
(2004)
CRYPTO '04
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
11
-
-
0037673373
-
Authenticated encryption in SSH: Provably fixing the SSH binary packet protocol
-
ACM
-
M. Bellare, T. Kohno, and C. Namprempre. Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. In CCS '02. ACM, 2002.
-
(2002)
CCS '02
-
-
Bellare, M.1
Kohno, T.2
Namprempre, C.3
-
12
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Springer
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In ASIACRYPT '00. Springer, 2000.
-
(2000)
ASIACRYPT '00
-
-
Bellare, M.1
Namprempre, C.2
-
13
-
-
0010224361
-
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography
-
Springer
-
M. Bellare and P. Rogaway. Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. In ASIACRYPT '00. Springer, 2000.
-
(2000)
ASIACRYPT '00
-
-
Bellare, M.1
Rogaway, P.2
-
14
-
-
0000874415
-
Limitations of the Kerberos authentication system
-
S. M. Bellovin and M. Merritt. Limitations of the Kerberos authentication system. SIGCOMM Comput. Commun. Rev., 20(5):119-132, 1990.
-
(1990)
SIGCOMM Comput. Commun. Rev
, vol.20
, Issue.5
, pp. 119-132
-
-
Bellovin, S.M.1
Merritt, M.2
-
15
-
-
34548793805
-
Provable-security analysis of authenticated encryption in Kerberos
-
paper. Available at
-
A. Boldyreva and V. Kumar. Provable-security analysis of authenticated encryption in Kerberos. Full version of this paper. Available at http://www-static.cc.gatech.edu/~aboldyre/publications.html, 2007.
-
(2007)
Full version of this
-
-
Boldyreva, A.1
Kumar, V.2
-
17
-
-
33750568156
-
Formal Analysis of Kerberos 5 Using
-
F. Butler, I. Cervesato, A. D. Jaggard, A. Scedrov, and C. Walstad. Formal Analysis of Kerberos 5 Using. In Theoretical Computer Science, 2006.
-
(2006)
Theoretical Computer Science
-
-
Butler, F.1
Cervesato, I.2
Jaggard, A.D.3
Scedrov, A.4
Walstad, C.5
-
18
-
-
34548797456
-
The use of encryption in Kerberos for network authentication (invited)
-
Springer
-
J. T. Kohl. The use of encryption in Kerberos for network authentication (invited). In CRYPTO '89. Springer, 1989.
-
(1989)
CRYPTO '89
-
-
Kohl, J.T.1
-
19
-
-
34548804202
-
-
T. Kohno. Searchable symmetric encryption: Improved definitions and efficient constructions. UCSD Dissertation, 2006.
-
T. Kohno. Searchable symmetric encryption: Improved definitions and efficient constructions. UCSD Dissertation, 2006.
-
-
-
-
20
-
-
28144446331
-
-
Network Working Group. Request for Comments:, Available at
-
C. Neuman, T. Yu, S. Hartman, and K. Raeburn. The Kerberos network authentication service (v5). Network Working Group. Request for Comments: 4120. Available at http://www.ietf.org/rfc/rfc4120.txt, 2005.
-
(2005)
The Kerberos network authentication service (v5)
, pp. 4120
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
22
-
-
34548709445
-
-
Network Working Group. Request for Comments:, Available at
-
K. Raeburn. Encryption and checksum specifications for Kerberos 5. Network Working Group. Request for Comments: 3961. Available at http://www.ietf.org/rfc/rfc3961.txt, 2005.
-
(2005)
Encryption and checksum specifications for Kerberos
, vol.5
, pp. 3961
-
-
Raeburn, K.1
-
24
-
-
19944425657
-
Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. ePrint Archive
-
Report 2004/199, Available at
-
X. Wang, D. Feng, X. Lai, and H. Yu. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. ePrint Archive: Report 2004/199, 2004. Available at http://eprint.iacr.org/.
-
(2004)
-
-
Wang, X.1
Feng, D.2
Lai, X.3
Yu, H.4
-
25
-
-
85180736317
-
A real-world analysis of Kerberos password security
-
The Internet Society
-
T. D. Wu. A real-world analysis of Kerberos password security. In NDSS '99. The Internet Society, 1999.
-
(1999)
NDSS '99
-
-
Wu, T.D.1
-
26
-
-
34548714475
-
The Kerberos network authentication service (version 5). IETF Internet draft
-
T. Yu. The Kerberos network authentication service (version 5). IETF Internet draft. Request for Comments: 1510, 2006.
-
(2006)
Request for Comments
, pp. 1510
-
-
Yu, T.1
-
27
-
-
34548739961
-
-
T. Yu, S. Hartman, and K. Raeburn. The perils of unauthenticated encryption: Kerberos version 4. In NDSS '04. The Internet Society, 2004
-
T. Yu, S. Hartman, and K. Raeburn. The perils of unauthenticated encryption: Kerberos version 4. In NDSS '04. The Internet Society, 2004.
-
-
-
|