-
1
-
-
70449625225
-
Plaintext recovery attacks against SSH
-
IEEE Computer Society
-
M. R. Albrecht, K. G. Paterson, and G. J. Watson. Plaintext Recovery Attacks against SSH. In S&P 2009, pages 16-26. IEEE Computer Society, 2009.
-
(2009)
S&P 2009
, pp. 16-26
-
-
Albrecht, M.R.1
Paterson, K.G.2
Watson, G.J.3
-
3
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
B. Preneel, editor Springer
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure against Dictionary Attacks. In B. Preneel, editor, EUROCRYPT 2000, volume 1807 of LNCS, pages 139-155. Springer, 2000.
-
(2000)
EUROCRYPT 2000, Volume 1807 of LNCS
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
84945119254
-
Entity authentication and key distribution
-
D. Stinson, editor Springer
-
M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In D. Stinson, editor, CRYPTO'93, volume 773 of LNCS, pages 232-249. Springer, 1993.
-
(1993)
CRYPTO'93, Volume 773 of LNCS
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
ACM
-
M. Bellare and P. Rogaway. Provably Secure Session Key Distribution: The Three Party Case. In STOC'95, pages 57-66. ACM, 1995.
-
(1995)
STOC'95
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
35048865382
-
Computationally sound mechanized proofs of correspondence assertions
-
DOI 10.1109/CSF.2007.16, 4271643, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
-
B. Blanchet. Computationally Sound Mechanized Proofs of Correspondence Assertions. In CSF 2007, pages 97-111. IEEE Computer Society, 2007. (Pubitemid 47554208)
-
(2007)
Proceedings - IEEE Computer Security Foundations Symposium
, pp. 97-111
-
-
Blanchet, B.1
-
8
-
-
28144462281
-
Universally composable security: A new paradigm for cryptographic protocols
-
December
-
R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. Technical Report 2000/067, Cryptology ePrint Archive, December 2005. http://eprint.iacr.org.
-
(2005)
Technical Report 2000/067, Cryptology EPrint Archive
-
-
Canetti, R.1
-
9
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
R. Canetti and H. Krawczyk. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In B. Pfitzmann, editor, EUROCRYPT 2001, volume 2045 of LNCS, pages 453-474. Springer, 2001. (Pubitemid 33275848)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
10
-
-
84869635960
-
Security analysis of IKE's signature-based key-exchange protocol
-
M. Yung, editor Springer
-
R. Canetti and H. Krawczyk. Security Analysis of IKE's Signature-Based Key-Exchange Protocol. In M. Yung, editor, CRYPTO 2002, volume 2442 of LNCS, pages 143-161. Springer, 2002.
-
(2002)
CRYPTO 2002, Volume 2442 of LNCS
, pp. 143-161
-
-
Canetti, R.1
Krawczyk, H.2
-
12
-
-
40149083066
-
Breaking and fixing public-key kerberos
-
I. Cervesato, A. D. Jaggard, A. Scedrov, J.-K. Tsay, and C. Walstad. Breaking and Fixing Public-key Kerberos. Inf. Comput., 206(2-4):402-424, 2008.
-
(2008)
Inf. Comput.
, vol.206
, Issue.2-4
, pp. 402-424
-
-
Cervesato, I.1
Jaggard, A.D.2
Scedrov, A.3
Tsay, J.-K.4
Walstad, C.5
-
13
-
-
26444442332
-
Security requirements for key establishment proof models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee protocols
-
Information Security and Privacy: 10th Australasian Conference, ACISP 2005. Proceedings
-
K.-K. R. Choo and Y. Hitchcock. Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. In C. Boyd and J. M. G. Nieto, editors, ACISP 2005, volume 3574 of LNCS, pages 429-442. Springer, 2005. (Pubitemid 41431800)
-
(2005)
Lecture Notes in Computer Science
, vol.3574
, pp. 429-442
-
-
Choo, K.-K.R.1
Hitchcock, Y.2
-
14
-
-
33947704230
-
Computationally sound compositional logic for key exchange protocols
-
DOI 10.1109/CSFW.2006.9, 1648728, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
-
A. Datta, A. Derek, J. C. Mitchell, and B. Warinschi. Computationally Sound Compositional Logic for Key Exchange Protocols. In CSFW 2006, pages 321-334. IEEE Computer Society, 2006. (Pubitemid 46499737)
-
(2006)
Proceedings of the Computer Security Foundations Workshop
, vol.2006
, pp. 321-334
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Warinschi, B.4
-
15
-
-
78650015837
-
On the (in)security of IPsec in MAC-then-encrypt configurations
-
ACM
-
J. P. Degabriele and K. G. Paterson. On the (In)Security of IPsec in MAC-then-Encrypt Configurations. In CCS 2010. ACM, 2010.
-
(2010)
CCS 2010
-
-
Degabriele, J.P.1
Paterson, K.G.2
-
16
-
-
57049104588
-
Universally composable security analysis of TLS
-
J. Baek, F. Bao, K. Chen, and X. Lai, editors Springer
-
S. Gajek, M. Manulis, O. Pereira, A. Sadeghi, and J. Schwenk. Universally Composable Security Analysis of TLS. In J. Baek, F. Bao, K. Chen, and X. Lai, editors, ProvSec 2008, volume 5324 of LNCS, pages 313-327. Springer, 2008.
-
(2008)
ProvSec 2008, Volume 5324 of LNCS
, pp. 313-327
-
-
Gajek, S.1
Manulis, M.2
Pereira, O.3
Sadeghi, A.4
Schwenk, J.5
-
17
-
-
77952415066
-
Partnership in key exchange protocols
-
W. Li, W. Susilo, U. K. Tupakula, R. Safavi-Naini, and V. Varadharajan, editors ACM
-
K. Kobara, S. Shin, and M. Strefler. Partnership in key exchange protocols. In W. Li, W. Susilo, U. K. Tupakula, R. Safavi-Naini, and V. Varadharajan, editors, ASIACCS 2009, pages 161-170. ACM, 2009.
-
(2009)
ASIACCS 2009
, pp. 161-170
-
-
Kobara, K.1
Shin, S.2
Strefler, M.3
-
19
-
-
33947621658
-
Simulation-based security with inexhaustible interactive turing machines
-
DOI 10.1109/CSFW.2006.30, 1648727, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
-
R. KÜsters. Simulation-Based Security with Inexhaustible Interactive Turing Machines. In CSFW 2006, pages 309-320. IEEE Computer Society, 2006. (Pubitemid 46499736)
-
(2006)
Proceedings of the Computer Security Foundations Workshop
, vol.2006
, pp. 309-320
-
-
Kusters, R.1
-
20
-
-
51749119261
-
Joint state theorems for public-key encryption and digitial signature functionalities with local computation
-
IEEE Computer Society
-
R. Küsters and M. Tuengerthal. Joint State Theorems for Public-Key Encryption and Digitial Signature Functionalities with Local Computation. In CSF 2008, pages 270-284. IEEE Computer Society, 2008.
-
(2008)
CSF 2008
, pp. 270-284
-
-
Küsters, R.1
Tuengerthal, M.2
-
21
-
-
70350540703
-
Universally composable symmetric encryption
-
IEEE Computer Society
-
R. Küsters and M. Tuengerthal. Universally Composable Symmetric Encryption. In CSF 2009, pages 293-307. IEEE Computer Society, 2009.
-
(2009)
CSF 2009
, pp. 293-307
-
-
Küsters, R.1
Tuengerthal, M.2
-
23
-
-
79951780220
-
Ideal key derivation and encryption in simulation-based security
-
A. Kiayias, editor Springer
-
R. Küsters and M. Tuengerthal. Ideal Key Derivation and Encryption in Simulation-based Security. In A. Kiayias, editor, CT-RSA 2011, volume 6558 of LNCS, pages 161-179. Springer, 2011.
-
(2011)
CT-RSA 2011, Volume 6558 of LNCS
, pp. 161-179
-
-
Küsters, R.1
Tuengerthal, M.2
-
24
-
-
28144456308
-
An attack on the needham-schroeder public-key authentication protocol
-
G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56:131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
26
-
-
70350536583
-
Authentication without elision: Partially specified protocols, associated data, and cryptographic models described by code
-
IEEE Computer Society
-
P. Rogaway and T. Stegers. Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code. In CSF 2009, pages 26-39. IEEE Computer Society, 2009.
-
(2009)
CSF 2009
, pp. 26-39
-
-
Rogaway, P.1
Stegers, T.2
-
27
-
-
70349147400
-
Practical attacks against WEP and WPA
-
D. A. Basin, S. Capkun, and W. Lee, editors ACM
-
E. Tews and M. Beck. Practical Attacks against WEP and WPA. In D. A. Basin, S. Capkun, and W. Lee, editors, WISEC 2009, pages 79-86. ACM, 2009.
-
(2009)
WISEC 2009
, pp. 79-86
-
-
Tews, E.1
Beck, M.2
|