-
3
-
-
84957714601
-
Robustness principles for public key protocols
-
D. Coppersmith, editor 963 of LNCS, Springer, Aug
-
R. J. Anderson and R. M. Needham. Robustness principles for public key protocols. In D. Coppersmith, editor, CRYPTO'95, volume 963 of LNCS, pages 236-247. Springer, Aug. 1995.
-
(1995)
CRYPTO'95
, pp. 236-247
-
-
Anderson, R.J.1
Needham, R.M.2
-
4
-
-
40149109757
-
A framework for compositional verification of security protocols
-
S. Andova, C. Cremers, K. Gjøsteen, S. Mauw, S. F. Mjølsnes, and S. Radomirović. A framework for compositional verification of security protocols. Information and Computation, 206:425-459, 2008.
-
(2008)
Information and Computation
, vol.206
, pp. 425-459
-
-
Andova, S.1
Cremers, C.2
Gjøsteen, K.3
Mauw, S.4
Mjølsnes, S.F.5
Radomirović, S.6
-
6
-
-
3142623034
-
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm
-
May
-
M. Bellare, T. Kohno, and C. Namprempre. Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm. ACM Transactions on Information and System Security, 7(2):206-241, May 2004. Extended abstract published in ACM CCS 2002.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 206-241
-
-
Bellare, M.1
Kohno, T.2
Namprempre, C.3
-
7
-
-
84945119254
-
Entity authentication and key distribution
-
D. R. Stinson, editor 773 of LNCS, Springer, Aug
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In D. R. Stinson, editor, CRYPTO'93, volume 773 of LNCS, pages 232-249. Springer, Aug. 1993.
-
(1993)
CRYPTO'93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
84910683418
-
Multi-ciphersuite security of the secure shell (ssh) protocol (full version)
-
F. Bergsma, B. Dowling, F. Kohlar, J. Schwenk, and D. Stebila. Multi-ciphersuite security of the Secure Shell (SSH) protocol (full version). Cryptology ePrint Archive, Report 2013/813, 2014. http://eprint.iacr.org/.
-
(2014)
Cryptology EPrint Archive, Report 2013/813
-
-
Bergsma, F.1
Dowling, B.2
Kohlar, F.3
Schwenk, J.4
Stebila, D.5
-
9
-
-
84881234333
-
Implementing tls with verified cryptographic security
-
IEEE Computer Society Press, May 2013
-
K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, and P.-Y. Strub. Implementing TLS with verified cryptographic security. In 2013 IEEE Symposium on Security and Privacy, pages 445-459. IEEE Computer Society Press, May 2013.
-
2013 IEEE Symposium on Security and Privacy
, pp. 445-459
-
-
Bhargavan, K.1
Fournet, C.2
Kohlweiss, M.3
Pironti, A.4
Strub, P.-Y.5
-
10
-
-
84905401236
-
Proving the tls handshake secure (as it is
-
J. A. Garay and R. Gennaro, editors 8617 of LNCS, Springer
-
K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, P.-Y. Strub, and S. Zanella-Béguelin. Proving the TLS handshake secure (as it is). In J. A. Garay and R. Gennaro, editors, CRYPTO 2014, volume 8617 of LNCS, pages 235-255. Springer, 2014.
-
(2014)
CRYPTO 2014
, pp. 235-255
-
-
Bhargavan, K.1
Fournet, C.2
Kohlweiss, M.3
Pironti, A.4
Strub, P.-Y.5
Zanella-Béguelin, S.6
-
11
-
-
84880165237
-
Less is more: Relaxed yet composable security notions for key exchange
-
August 2013
-
C. Brzuska, M. Fischlin, N. P. Smart, B. Warinschi, and S. C. Williams. Less is more: Relaxed yet composable security notions for key exchange. International Journal of Information Security, 12(4):267-297, August 2013.
-
International Journal of Information Security
, vol.12
, Issue.4
, pp. 267-297
-
-
Brzuska, C.1
Fischlin, M.2
Smart, N.P.3
Warinschi, B.4
Williams, S.C.5
-
12
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE Computer Society Press, Oct
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In 42nd FOCS, pages 136-145. IEEE Computer Society Press, Oct. 2001.
-
(2001)
42nd FOCS
, pp. 136-145
-
-
Canetti, R.1
-
13
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
B. Pfitzmann, editor 2045 of LNCS, Springer, May 2001
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In B. Pfitzmann, editor, EUROCRYPT 2001, volume 2045 of LNCS, pages 453-474. Springer, May 2001.
-
(2001)
EUROCRYPT
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
14
-
-
2642523732
-
Environmental requirements for authentication protocols
-
M. Okada, B. C. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors 2609 of LNCS, Springer
-
R. Canetti, C. Meadows, and P. Syverson. Environmental requirements for authentication protocols. In M. Okada, B. C. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, Proc. Mext-NSF-JSPS Internaional Symposium on Software Security (ISSS)-Theories and Systems, Part 9, volume 2609 of LNCS, pages 339-355. Springer, 2002.
-
(2002)
Proc. Mext-NSF-JSPS Internaional Symposium on Software Security (ISSS)-Theories and Systems, Part 9
, pp. 339-355
-
-
Canetti, R.1
Meadows, C.2
Syverson, P.3
-
16
-
-
24144437949
-
Secure protocol composition
-
A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic. Secure protocol composition. Electronic Notes in Theoretical Computer Science, 83(15), 2004.
-
(2004)
Electronic Notes in Theoretical Computer Science
, vol.83
, Issue.15
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
17
-
-
84888996809
-
On the security of TLS renegotiation
-
A.-R. Sadeghi, V. D. Gligor, and M. Yung, editors ACM Press, Nov
-
F. Giesen, F. Kohlar, and D. Stebila. On the security of TLS renegotiation. In A.-R. Sadeghi, V. D. Gligor, and M. Yung, editors, ACM CCS 13, pages 387-398. ACM Press, Nov. 2013.
-
(2013)
ACM CCS 13
, pp. 387-398
-
-
Giesen, F.1
Kohlar, F.2
Stebila, D.3
-
19
-
-
84910631271
-
RSA key exchange for the secure shell (ssh) transport layer protocol
-
Mar
-
B. Harris. RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol. RFC 4432 (Proposed Standard), Mar. 2006.
-
(2006)
RFC 4432 (Proposed Standard
-
-
Harris, B.1
-
20
-
-
84865461888
-
On the security of TLS-DHE in the standard model
-
R. Safavi-Naini and R. Canetti, editors 7417 of LNCS, Springer, Aug
-
T. Jager, F. Kohlar, S. Schäge, and J. Schwenk. On the security of TLS-DHE in the standard model. In R. Safavi-Naini and R. Canetti, editors, CRYPTO 2012, volume 7417 of LNCS, pages 273-293. Springer, Aug. 2012.
-
(2012)
CRYPTO 2012
, pp. 273-293
-
-
Jager, T.1
Kohlar, F.2
Schäge, S.3
Schwenk, J.4
-
22
-
-
84937433296
-
On the security of rsa encryption in tls
-
M. Yung, editor 2442 of LNCS, Springer, Aug. 2002
-
J. Jonsson and B. S. Kaliski Jr. On the security of RSA encryption in TLS. In M. Yung, editor, CRYPTO 2002, volume 2442 of LNCS, pages 127-142. Springer, Aug. 2002.
-
CRYPTO 2002
, pp. 127-142
-
-
Jonsson, J.1
Kaliski, B.S.2
-
23
-
-
84956985093
-
Protocol interactions and the chosen protocol attack
-
B. Christianson, B. Crispo, M. Lomas, and M. Roe, editors 1361 of LNCS, Springer
-
J. Kelsey, B. Schneier, and D. Wagner. Protocol interactions and the chosen protocol attack. In B. Christianson, B. Crispo, M. Lomas, and M. Roe, editors, Proc. 5th International Workshop on Security Protocols, volume 1361 of LNCS, pages 91-104. Springer, 1997.
-
(1997)
Proc. 5th International Workshop on Security Protocols
, pp. 91-104
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
25
-
-
77957013995
-
Cryptographic extraction and key derivation: The HKDF scheme
-
T. Rabin, editor 6223 of LNCS, Springer, Aug
-
H. Krawczyk. Cryptographic extraction and key derivation: The HKDF scheme. In T. Rabin, editor, CRYPTO 2010, volume 6223 of LNCS, pages 631-648. Springer, Aug. 2010.
-
(2010)
CRYPTO 2010
, pp. 631-648
-
-
Krawczyk, H.1
-
26
-
-
84884484198
-
On the security of the tls protocol: A systematic analysis
-
R. Canetti and J. A. Garay, editors 8042 of LNCS, Springer, Aug
-
H. Krawczyk, K. G. Paterson, and H. Wee. On the security of the TLS protocol: A systematic analysis. In R. Canetti and J. A. Garay, editors, CRYPTO 2013, Part I, volume 8042 of LNCS, pages 429-448. Springer, Aug. 2013.
-
(2013)
CRYPTO 2013, Part i
, pp. 429-448
-
-
Krawczyk, H.1
Paterson, K.G.2
Wee, H.3
-
27
-
-
38149012093
-
Stronger security of authenticated key exchange
-
W. Susilo, J. K. Liu, and Y. Mu, editors 4784 of LNCS, Springer, Nov. 2007
-
B. A. LaMacchia, K. Lauter, and A. Mityagin. Stronger security of authenticated key exchange. In W. Susilo, J. K. Liu, and Y. Mu, editors, ProvSec 2007, volume 4784 of LNCS, pages 1-16. Springer, Nov. 2007.
-
ProvSec 2007
, pp. 1-16
-
-
Lamacchia, B.A.1
Lauter, K.2
Mityagin, A.3
-
28
-
-
84869409533
-
A cross-protocol attack on the TLS protocol
-
T. Yu, G. Danezis, and V. D. Gligor, editors ACM Press, Oct
-
N. Mavrogiannopoulos, F. Vercauteren, V. Velichkov, and B. Preneel. A cross-protocol attack on the TLS protocol. In T. Yu, G. Danezis, and V. D. Gligor, editors, ACM CCS 12, pages 62-72. ACM Press, Oct. 2012.
-
(2012)
ACM CCS 12
, pp. 62-72
-
-
Mavrogiannopoulos, N.1
Vercauteren, F.2
Velichkov, V.3
Preneel, B.4
-
29
-
-
58349099301
-
A modular security analysis of the TLS handshake protocol
-
J. Pieprzyk, editor 5350 of LNCS, Springer, Dec. 2008
-
P. Morrissey, N. P. Smart, and B. Warinschi. A modular security analysis of the TLS handshake protocol. In J. Pieprzyk, editor, ASIACRYPT 2008, volume 5350 of LNCS, pages 55-73. Springer, Dec. 2008.
-
ASIACRYPT 2008
, pp. 55-73
-
-
Morrissey, P.1
Smart, N.P.2
Warinschi, B.3
-
30
-
-
77954650216
-
Plaintext-dependent decryption: A formal security treatment of ssh-ctr
-
H. Gilbert, editor 6110 of LNCS, Springer, May 2010
-
K. G. Paterson and G. J. Watson. Plaintext-dependent decryption: A formal security treatment of SSH-CTR. In H. Gilbert, editor, EUROCRYPT 2010, volume 6110 of LNCS, pages 345-361. Springer, May 2010.
-
EUROCRYPT 2010
, pp. 345-361
-
-
Paterson, K.G.1
Watson, G.J.2
-
31
-
-
38049131119
-
Formalizing human ignorance
-
P. Q. Nguyen, editor 4341 of LNCS, Springer, Sept
-
P. Rogaway. Formalizing human ignorance. In P. Q. Nguyen, editor, Progress in Cryptology-VIETCRYPT 06, volume 4341 of LNCS, pages 211-228. Springer, Sept. 2006.
-
(2006)
Progress in Cryptology-VIETCRYPT 06
, pp. 211-228
-
-
Rogaway, P.1
-
32
-
-
85014852507
-
Elliptic curve algorithm integration in the secure shell transport layer
-
Dec
-
D. Stebila and J. Green. Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer. RFC 5656 (Proposed Standard), Dec. 2009.
-
(2009)
RFC 5656 (Proposed Standard
-
-
Stebila, D.1
Green, J.2
-
34
-
-
0033605501
-
Inter-protocol interleaving attacks on some authentication and key distribution protocols
-
March
-
W.-G. Tzeng and C.-M. Hu. Inter-protocol interleaving attacks on some authentication and key distribution protocols. Information Processing Letters, 69(6):297-302, March 1999.
-
(1999)
Information Processing Letters
, vol.69
, Issue.6
, pp. 297-302
-
-
Tzeng, W.-G.1
Hu, C.-M.2
-
40
-
-
33846453163
-
The secure shell (ssh) transport layer protocol
-
Jan. Updated by RFC 6668
-
T. Ylonen and C. Lonvick. The Secure Shell (SSH) Transport Layer Protocol. RFC 4253 (Proposed Standard), Jan. 2006. Updated by RFC 6668.
-
(2006)
RFC 4253 (Proposed Standard
-
-
Ylonen, T.1
Lonvick, C.2
|