-
1
-
-
84937579774
-
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES
-
Naccache, D. (ed.) CT-RSA 2001. Springer, Heidelberg
-
Abdalla, M., Bellare, M., Rogaway, P.: The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143-158. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
3
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
33746041431
-
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84949230533
-
Key Agreement Protocols and their Security Analysis
-
Darnell, M. (ed.) Cryptography and Coding 1997. Springer, Heidelberg
-
Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Darnell, M. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
7
-
-
84957693225
-
Chosen Ciphertext Attacks against Protocols Based on the RSA Encryption Standard PKCS #1
-
Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
-
Bleichenbacher, D.: Chosen Ciphertext Attacks against Protocols Based on the RSA Encryption Standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1-12. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
8
-
-
84865510770
-
Less is more: Relaxed yet composable security notions for key exchange
-
ePrint Archive, Report 2012/242
-
Brzuska, C., Fischlin, M., Smart, N.P., Warinschi, B., Williams, S.: Less is more: Relaxed yet composable security notions for key exchange. Cryptology ePrint Archive, Report 2012/242 (2012), http://eprint.iacr.org/
-
(2012)
Cryptology
-
-
Brzuska, C.1
Fischlin, M.2
Smart, N.P.3
Warinschi, B.4
Williams, S.5
-
9
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE Computer Society Press October
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science, pp. 136-145. IEEE Computer Society Press (October 2001)
-
(2001)
42nd Annual Symposium on Foundations of Computer Science
, pp. 136-145
-
-
Canetti, R.1
-
10
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
11
-
-
84869635960
-
Security Analysis of IKE's Signature-Based Key-Exchange Protocol
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Security Analysis of IKE's Signature-Based Key-Exchange Protocol. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 143-161. Springer, Heidelberg (2002), http://eprint.iacr.org/2002/120/
-
(2002)
LNCS
, vol.2442
, pp. 143-161
-
-
Canetti, R.1
Krawczyk, H.2
-
12
-
-
33646805409
-
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
-
Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
-
Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability- Based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585-604. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 585-604
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
13
-
-
68849108882
-
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
-
Cremers, C.J.F.: Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 20-33. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5536
, pp. 20-33
-
-
Cremers, C.J.F.1
-
14
-
-
0003956839
-
-
Version 1.0. RFC 2246 (Proposed Standard) January Obsoleted by RFC 4346, updated by RFCs 3546, 5746
-
Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246 (Proposed Standard) (January 1999); Obsoleted by RFC 4346, updated by RFCs 3546, 5746
-
(1999)
The TLS Protocol
-
-
Dierks, T.1
Allen, C.2
-
15
-
-
33847753565
-
-
Version 1.1. RFC 4346 (Proposed Standard) April Obsoleted by RFC 5246, updated by RFCs 4366, 4680, 4681, 5746
-
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 (Proposed Standard) (April 2006); Obsoleted by RFC 5246, updated by RFCs 4366, 4680, 4681, 5746
-
(2006)
The Transport Layer Security (TLS) Protocol
-
-
Dierks, T.1
Rescorla, E.2
-
17
-
-
57049104588
-
Universally Composable Security Analysis of TLS
-
Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. Springer, Heidelberg
-
Gajek, S., Manulis, M., Pereira, O., Sadeghi, A.-R., Schwenk, J.: Universally Composable Security Analysis of TLS. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 313-327. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5324
, pp. 313-327
-
-
Gajek, S.1
Manulis, M.2
Pereira, O.3
Sadeghi, A.-R.4
Schwenk, J.5
-
18
-
-
84899441715
-
On the security of TLS-DHE in the Standard Model (full version)
-
ePrint Archive, Report 2011/219 (revised 2012)
-
Jager, T., Kohlar, F., Schäge, S., Schwenk, J.: On the security of TLS-DHE in the Standard Model (full version). Cryptology ePrint Archive, Report 2011/219 (2011) (revised 2012), http://eprint.iacr.org/2011/219
-
(2011)
Cryptology
-
-
Jager, T.1
Kohlar, F.2
Schäge, S.3
Schwenk, J.4
-
19
-
-
38149012093
-
Stronger Security of Authenticated Key Exchange
-
Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. Springer, Heidelberg
-
LaMacchia, B.A., Lauter, K., Mityagin, A.: Stronger Security of Authenticated Key Exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4784
, pp. 1-16
-
-
LaMacchia, B.A.1
Lauter, K.2
Mityagin, A.3
-
20
-
-
58349099301
-
A Modular Security Analysis of the TLS Handshake Protocol
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Morrissey, P., Smart, N.P., Warinschi, B.: A Modular Security Analysis of the TLS Handshake Protocol. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 55-73. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 55-73
-
-
Morrissey, P.1
Smart, N.P.2
Warinschi, B.3
-
21
-
-
73849111632
-
The TLS Handshake protocol: A modular analysis
-
Morrissey, P., Smart, N.P.,Warinschi, B.: The TLS Handshake protocol: A modular analysis. Journal of Cryptology 23(2), 187-223 (2010)
-
(2010)
Journal of Cryptology
, vol.23
, Issue.2
, pp. 187-223
-
-
Morrissey, P.1
Smart, N.P.2
Warinschi, B.3
-
22
-
-
82955189836
-
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
-
Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
-
Paterson, K.G., Ristenpart, T., Shrimpton, T.: Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 372-389. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 372-389
-
-
Paterson, K.G.1
Ristenpart, T.2
Shrimpton, T.3
-
23
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
ePrint Archive, Report 2004/332 November
-
Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (November 2004)
-
(2004)
Cryptology
-
-
Shoup, V.1
|