-
1
-
-
24144444566
-
One-time verifier-based encrypted key exchange
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
Abdalla, M., Chevassut, O., Pointcheval, D.: One-Time Verifier-Based Encrypted Key Exchange. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 47-64. Springer, Heidelberg (2005) (Pubitemid 41231325)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 47-64
-
-
Abdalla, M.1
Chevassut, O.2
Pointcheval, D.3
-
2
-
-
70449625225
-
Plaintext recovery attacks against SSH
-
IEEE Computer Society
-
Albrecht, M., Paterson, K., Watson, G.: Plaintext recovery attacks against SSH. In: IEEE Symposium on Security and Privacy, pp. 16-26. IEEE Computer Society (2009)
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 16-26
-
-
Albrecht, M.1
Paterson, K.2
Watson, G.3
-
3
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
ACM
-
Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of the 13th Annual ACM Symposium on Theory of Computing, pp. 419-428. ACM (1998)
-
(1998)
Proceedings of the 13th Annual ACM Symposium on Theory of Computing
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
3142623034
-
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm
-
Bellare, M., Kohno, T., Namprempre, C.: Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm. ACM Transactions on Information and Systems Security 7(2), 206-241 (2004)
-
(2004)
ACM Transactions on Information and Systems Security
, vol.7
, Issue.2
, pp. 206-241
-
-
Bellare, M.1
Kohno, T.2
Namprempre, C.3
-
5
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
84949230533
-
Key Agreement Protocols and Their Security Analysis
-
Cryptography and Coding
-
Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997) (Pubitemid 128005797)
-
(1997)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
9
-
-
84957001208
-
Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques
-
Security Protocols
-
Blake-Wilson, S., Menezes, A.: Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 137-158. Springer, Heidelberg (1998) (Pubitemid 128023886)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1361
, pp. 137-158
-
-
Blake-Wilson, S.1
Menezes, A.2
-
10
-
-
50849127145
-
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Bresson, E., Chevassut, O., Pointcheval, D.: Provably Authenticated Group Diffie-Hellman Key Exchange - the Dynamic Case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 290-309. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 290-309
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
11
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Canetti, R., Krawczyk, H.: Analysis of Key Exchange Protocols and their use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001) (Pubitemid 33275848)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
12
-
-
84947232363
-
Universally Composable Notions of Key Exchange and Secure Channels
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Universally Composable Notions of Key Exchange and Secure Channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 337-351. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
13
-
-
33646805409
-
Examining indistinguishability-based proof models for key establishment protocols
-
DOI 10.1007/11593447-32, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability- Based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585-604. Springer, Heidelberg (2005) (Pubitemid 43763497)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788 LNCS
, pp. 585-604
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
15
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Diffie, W., Oorschot, P.V., Wiener, M.: Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2(2), 107-125 (1992)
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Oorschot, P.V.2
Wiener, M.3
-
17
-
-
33646756559
-
Modular security proofs for key agreement protocols
-
DOI 10.1007/11593447-30, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
Kudla, C., Paterson, K.G.: Modular Security Proofs for Key Agreement Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 549-565. Springer, Heidelberg (2005) (Pubitemid 43763495)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788 LNCS
, pp. 549-565
-
-
Kudla, C.1
Paterson, K.G.2
-
18
-
-
73849111632
-
The TLS handshake protocol: A modular analysis
-
Morrissey, P., Smart, N., Warinschi, B.: The TLS handshake protocol: A modular analysis. Journal of Cryptology 23(2), 187-223 (2010)
-
(2010)
Journal of Cryptology
, vol.23
, Issue.2
, pp. 187-223
-
-
Morrissey, P.1
Smart, N.2
Warinschi, B.3
-
19
-
-
78649873528
-
One-Time-Password-Authenticated Key Exchange
-
Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. Springer, Heidelberg
-
Paterson, K.G., Stebila, D.: One-Time-Password-Authenticated Key Exchange. In: Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. LNCS, vol. 6168, pp. 264-281. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6168
, pp. 264-281
-
-
Paterson, K.G.1
Stebila, D.2
-
20
-
-
77954650216
-
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Paterson, K., Watson, G.: Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 345-361. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 345-361
-
-
Paterson, K.1
Watson, G.2
-
22
-
-
33845272477
-
The secure shell (SSH) protocol architecture
-
Ylonen, T., Lonvick, C.: The secure shell (SSH) protocol architecture (2006) RFC 4251
-
(2006)
RFC
, vol.4251
-
-
Ylonen, T.1
Lonvick, C.2
-
23
-
-
72049108240
-
The secure shell (SSH) authentication protocol
-
Ylonen, T., Lonvick, C.: The secure shell (SSH) authentication protocol (2006) RFC 4252
-
(2006)
RFC
, vol.4252
-
-
Ylonen, T.1
Lonvick, C.2
-
24
-
-
51249100696
-
The secure shell (SSH) transport layer protocol
-
Ylonen, T., Lonvick, C.: The secure shell (SSH) transport layer protocol (2006) RFC 4253
-
(2006)
RFC
, vol.4253
-
-
Ylonen, T.1
Lonvick, C.2
-
25
-
-
33846448045
-
The secure shell (SSH) connection protocol
-
Ylonen, T., Lonvick, C.: The secure shell (SSH) connection protocol (2006) RFC 4254
-
(2006)
RFC
, vol.4254
-
-
Ylonen, T.1
Lonvick, C.2
|