-
1
-
-
84945119254
-
Entity authentication and key distribution
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO'93, pages 232-249, 1993.
-
(1993)
CRYPTO'93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
38049077890
-
A closer look at PKI: Security and efficiency
-
A. Boldyreva, M. Fischlin, A. Palacio, and B. Warinschi. A closer look at PKI: Security and efficiency. In PKC 2007, pages 458-475, 2007.
-
(2007)
PKC 2007
, pp. 458-475
-
-
Boldyreva, A.1
Fischlin, M.2
Palacio, A.3
Warinschi, B.4
-
4
-
-
84884782411
-
ASICS: Authenticated key exchange security incorporating certification systems
-
C. Boyd, C. Cremers, M. Feltz, K. G. Paterson, B. Poettering, and D. Stebila. ASICS: Authenticated key exchange security incorporating certification systems. In ESORICS 2013, pages 381-399, 2013.
-
(2013)
ESORICS 2013
, pp. 381-399
-
-
Boyd, C.1
Cremers, C.2
Feltz, M.3
Paterson, K.G.4
Poettering, B.5
Stebila, D.6
-
5
-
-
84910685897
-
-
PhD thesis, Technische Universität Darmstadt, Darmstadt, Germany, retrieved on 2014-05-14
-
C. Brzuska. On the Foundations of Key Exchange. PhD thesis, Technische Universität Darmstadt, Darmstadt, Germany, 2013. http://tuprints.ulb.tu-darmstadt.de/3414/, retrieved on 2014-05-14.
-
(2013)
On the Foundations of Key Exchange
-
-
Brzuska, C.1
-
6
-
-
84880165237
-
Less is more: Relaxed yet composable security notions for key exchange
-
C. Brzuska, M. Fischlin, N. P. Smart, B. Warinschi, and S. C. Williams. Less is more: relaxed yet composable security notions for key exchange. Int. J. Inf. Sec., 12(4):267-297, 2013.
-
(2013)
Int. J. Inf. Sec.
, vol.12
, Issue.4
, pp. 267-297
-
-
Brzuska, C.1
Fischlin, M.2
Smart, N.P.3
Warinschi, B.4
Williams, S.C.5
-
7
-
-
80755168373
-
Composability of Bellare-Rogaway key exchange protocols
-
C. Brzuska, M. Fischlin, B. Warinschi, and S. C. Williams. Composability of Bellare-Rogaway key exchange protocols. In ACM CCS 11, pages 51-62, 2011.
-
(2011)
ACM CCS 11
, pp. 51-62
-
-
Brzuska, C.1
Fischlin, M.2
Warinschi, B.3
Williams, S.C.4
-
8
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In EUROCRYPT 2001, pages 453-474, 2001.
-
(2001)
EUROCRYPT
, vol.2001
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
10
-
-
85037097485
-
Security analysis of the extended access control protocol for machine readable travel documents
-
Ö. Dagdelen and M. Fischlin. Security analysis of the extended access control protocol for machine readable travel documents. In ISC 2010, pages 54-68, 2010.
-
(2010)
ISC 2010
, pp. 54-68
-
-
Dagdelen, O.1
Fischlin, M.2
-
11
-
-
77956573382
-
The transport layer security (TLS) protocol version 1.2. RFC 5246 (proposed standard) 2008
-
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), 2008. Updated by RFCs 5746, 5878, 6176.
-
Updated by RFCs 5746
, vol.5878
, pp. 6176
-
-
Dierks, T.1
Rescorla, E.2
-
12
-
-
70350660548
-
Certified encryption revisited
-
P. Farshim and B. Warinschi. Certified encryption revisited. In AFRICACRYPT 09, pages 179-197, 2009.
-
(2009)
AFRICACRYPT 09
, pp. 179-197
-
-
Farshim, P.1
Warinschi, B.2
-
13
-
-
84888996809
-
On the security of TLS renegotiation
-
F. Giesen, F. Kohlar, and D. Stebila. On the security of TLS renegotiation. In ACM CCS 13, pages 387-398, 2013.
-
(2013)
ACM CCS 13
, pp. 387-398
-
-
Giesen, F.1
Kohlar, F.2
Stebila, D.3
-
14
-
-
84865461888
-
On the security of TLS-DHE in the standard model
-
T. Jager, F. Kohlar, S. Schäge, and J. Schwenk. On the security of TLS-DHE in the standard model. In CRYPTO 2012, pages 273-293, 2012.
-
(2012)
CRYPTO 2012
, pp. 273-293
-
-
Jager, T.1
Kohlar, F.2
Schäge, S.3
Schwenk, J.4
-
15
-
-
84949186835
-
Mutual authentication for low-power mobile devices
-
M. Jakobsson and D. Pointcheval. Mutual authentication for low-power mobile devices. In FC 2001, pages 178-195, 2001.
-
(2001)
FC 2001
, pp. 178-195
-
-
Jakobsson, M.1
Pointcheval, D.2
-
16
-
-
84884484198
-
On the security of the TLS protocol: A systematic analysis
-
H. Krawczyk, K. G. Paterson, and H. Wee. On the security of the TLS protocol: A systematic analysis. In CRYPTO 2013, Part I, pages 429-448, 2013.
-
(2013)
CRYPTO 2013
, pp. 429-448
-
-
Krawczyk, H.1
Paterson, K.G.2
Wee, H.3
-
17
-
-
33646756559
-
Modular security proofs for key agreement protocols
-
C. Kudla and K. G. Paterson. Modular security proofs for key agreement protocols. In ASIACRYPT 2005, pages 549-565, 2005.
-
(2005)
ASIACRYPT 2005
, pp. 549-565
-
-
Kudla, C.1
Paterson, K.G.2
-
18
-
-
38149012093
-
Stronger security of authenticated key exchange
-
B. A. LaMacchia, K. Lauter, and A. Mityagin. Stronger security of authenticated key exchange. In ProvSec 2007, pages 1-16, 2007.
-
(2007)
ProvSec 2007
, pp. 1-16
-
-
Lamacchia, B.A.1
Lauter, K.2
Mityagin, A.3
-
19
-
-
84910612876
-
-
retrieved on 2014-04-16
-
A. Langley and W.-T. Chang. QUIC Crypto. https://docs.google.com/document/d/1g5nIXAIkN-Y-7XJW5K45IblHd-L2f5LTaDUDwvZ5L6g/, 2013. retrieved on 2014-04-16.
-
(2013)
QUIC Crypto
-
-
Langley, A.1
Chang, W.-T.2
-
20
-
-
33745816645
-
Security analysis of KEA authenticated key exchange protocol
-
K. Lauter and A. Mityagin. Security analysis of KEA authenticated key exchange protocol. In PKC 2006, pages 378-394, 2006.
-
(2006)
PKC 2006
, pp. 378-394
-
-
Lauter, K.1
Mityagin, A.2
-
21
-
-
84937389342
-
The gap-problems: A new class of problems for the security of cryptographic schemes
-
T. Okamoto and D. Pointcheval. The gap-problems: A new class of problems for the security of cryptographic schemes. In PKC 2001, pages 104-118, 2001.
-
(2001)
PKC 2001
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
|