-
1
-
-
34547139941
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Abadi, M., Rogaway, P.: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptology 20(3), 395(2007)
-
(2007)
J. Cryptology
, vol.20
, Issue.3
, pp. 395
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
IEEE
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Proceedings of 38th Annual Symposium on Foundations of Computer Science (FOCS 1997), pp. 394-403. IEEE (1997)
-
(1997)
Proceedings of 38th Annual Symposium on Foundations of Computer Science (FOCS 1997)
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
3
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Okamoto, T. ed., Springer, Heidelberg
-
Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
-
(2000)
ASIACRYPT 2000. LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
4
-
-
0037673373
-
Authenticated encrytion in SSH: Provably fixing the SSH binary packet protocol
-
Bellare, M., Kohno, T., Namprempre, C.: Authenticated encrytion in SSH: Provably fixing the SSH binary packet protocol. In: ACM Conference on Computer and Communications Security, pp. 1-11(2002)
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 1-11
-
-
Bellare, M.1
Kohno, T.2
Namprempre, C.3
-
5
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
DOI 10.1007/11761679-25, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Bellare, M., Rogaway, P.: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006) (Pubitemid 44072253)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
35248875326
-
Relaxing chosen ciphertext security of encryption schemes
-
Boneh, D. ed., Springer, Heidelberg
-
Canetti, R., Krawczyk, H., Nielsen, J. B.: Relaxing Chosen Ciphertext Security of Encryption Schemes. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565-582. Springer, Heidelberg (2003)
-
(2003)
CRYPTO 2003. LNCS
, vol.2729
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.B.3
-
7
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: Foundations of Computer Science - FOCS (2001)
-
(2001)
Foundations of Computer Science - FOCS
-
-
Canetti, R.1
-
8
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001) (Pubitemid 33275848)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
9
-
-
35248836120
-
Password interception in a SSL/TLS channel
-
Canvel, B., Hiltgen, A. P., Vaudenay, S., Vuagnoux, M.: Password interception in a SSL/TLS Channel. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 583-599. Springer, Heidelberg (2003) (Pubitemid 137636965)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 583-599
-
-
Canvel, B.1
Hiltgen, A.2
Vaudenay, S.3
Vuagnoux, M.4
-
14
-
-
82955204023
-
-
GnuTLS Documentation (2011), http://www.gnu.org/software/gnutls/ documentat.html
-
(2011)
GnuTLS Documentation
-
-
-
15
-
-
84880901653
-
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
-
Advances in Cryptology - CRYPTO 2001
-
Krawczyk, H.: The Order of Encryption and Authentication for Protecting Communications (or: How Secure is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310-331. Springer, Heidelberg (2001) (Pubitemid 33317923)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 310-331
-
-
Krawczyk, H.1
-
17
-
-
38549143135
-
Cryptographic algorithm implementation requirements for encapsulating security payload (ESP) and authentication header (AH)
-
April
-
Manral, V.: Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH). RFC 4835 (April 2007), http://www.ietf.org/rfc/rfc4835.txt
-
(2007)
RFC 4835
-
-
Manral, V.1
-
20
-
-
33746068613
-
A provable-security treatment of the key-wrap problem
-
DOI 10.1007/11761679-23, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Rogaway, P., Shrimpton, T.: A Provable-Security Treatment of the Key-Wrap Problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 373-390. Springer, Heidelberg (2006) (Pubitemid 44072251)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4004
, pp. 373-390
-
-
Rogaway, P.1
Shrimpton, T.2
-
21
-
-
0036086129
-
Statistical identification of encrypted web browsing traffic
-
Sun, Q., Simon, D., Wang, Y., Russell, W., Padmanabhan, V., Qiu, L.: Statistical identification of encrypted web browsing traffic. In: IEEE Symposium on Security and Privacy, pp. 19-30(2002) (Pubitemid 34648101)
-
(2002)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 19-30
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.-M.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
22
-
-
84947212539
-
Security flaws induced by CBC padding - Applications to SSL, IPSEC, WTLS
-
Knudsen, L. R. ed., Springer, Heidelberg
-
Vaudenay, S.: Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS. In: Knudsen, L. R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 534-546. Springer, Heidelberg (2002)
-
(2002)
EUROCRYPT 2002. LNCS
, vol.2332
, pp. 534-546
-
-
Vaudenay, S.1
-
23
-
-
80051967189
-
Phonotactic reconstruction of encrypted voip conversations: Hookt on fon-iks
-
White, A., Matthews, A., Snow, K., Monrose, F.: Phonotactic Reconstruction of Encrypted VoIP conversations: Hookt on fon-iks. In: IEEE Symposium on Security and Privacy (2011)
-
(2011)
IEEE Symposium on Security and Privacy
-
-
White, A.1
Matthews, A.2
Snow, K.3
Monrose, F.4
-
24
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
-
Wright, C., Ballard, L., Coull, S., Monrose, F., Masson, G.: Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. In: IEEE Symposium on Security and Privacy, pp. 35-49(2008)
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 35-49
-
-
Wright, C.1
Ballard, L.2
Coull, S.3
Monrose, F.4
Masson, G.5
-
25
-
-
78651398360
-
Uncovering spoken phrases in encrypted voice over IP conversations
-
Wright, C., Ballard, L., Coull, S., Monrose, F., Masson, G.: Uncovering Spoken Phrases in Encrypted Voice over IP Conversations. ACM Trans. Inf. Syst. Secur. 13(4) (2010)
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.4
-
-
Wright, C.1
Ballard, L.2
Coull, S.3
Monrose, F.4
Masson, G.5
-
26
-
-
33845735523
-
On inferring application protocol behaviors in encrypted network traffic
-
Wright, C., Monrose, F., Masson, G.: On Inferring Application Protocol Behaviors in Encrypted Network Traffic. Journal of Machine Learning Research 6, 2745-2769(2006) (Pubitemid 46011489)
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2745-2769
-
-
Wright, C.V.1
Monrose, F.2
Masson, G.M.3
|