-
2
-
-
78049402611
-
Modeling and analyzing security in the presence of compromising adversaries
-
In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.), Springer, Heidelberg
-
Basin, D., Cremers, C.: Modeling and analyzing security in the presence of compromising adversaries. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 340-356. Springer, Heidelberg (2010)
-
(2010)
ESORICS 2010. LNCS
, vol.6345
, pp. 340-356
-
-
Basin, D.1
Cremers, C.2
-
4
-
-
84892725087
-
Provably repairing the ISO/IEC 9798 standard for entity authentication
-
Basin, D., Cremers, C., Meier, S.: Provably repairing the ISO/IEC 9798 standard for entity authentication. Journal of Computer Security 21(6), 817-846 (2013)
-
(2013)
Journal of Computer Security
, vol.21
, Issue.6
, pp. 817-846
-
-
Basin, D.1
Cremers, C.2
Meier, S.3
-
5
-
-
84933052188
-
Improving the security of cryptographic protocol standards
-
Basin, D., Cremers, C., Miyazaki, K., Radomirovic, S., Watanabe, D.: Improving the security of cryptographic protocol standards. IEEE Security & Privacy (2014)
-
(2014)
IEEE Security & Privacy
-
-
Basin, D.1
Cremers, C.2
Miyazaki, K.3
Radomirovic, S.4
Watanabe, D.5
-
6
-
-
84949230533
-
Key agreement protocols and their security analysis
-
In: Darnell, M. (ed.), Springer, Heidelberg
-
Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997)
-
(1997)
Cryptography and Coding 1997. LNCS
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
9
-
-
77950669596
-
Parsing ambiguities in authentication and key establishment protocols
-
Chen, L., Mitchell, C.J.: Parsing ambiguities in authentication and key establishment protocols. Int. J. Electron. Secur. Digit. Forensics 3(1), 82-94 (2010)
-
(2010)
Int. J. Electron. Secur. Digit. Forensics
, vol.3
, Issue.1
, pp. 82-94
-
-
Chen, L.1
Mitchell, C.J.2
-
10
-
-
77950665222
-
Attacks on an ISO/IEC 11770-2 key establishment protocol
-
Cheng, Z., Comley, R.: Attacks on an ISO/IEC 11770-2 key establishment protocol. I. J. Network Security 3(3), 290-295 (2006)
-
(2006)
I. J. Network Security
, vol.3
, Issue.3
, pp. 290-295
-
-
Cheng, Z.1
Comley, R.2
-
11
-
-
48949088211
-
The Scyther Tool: Verification, falsification, and analysis of security protocols
-
In: Gupta, A., Malik, S. (eds.), Springer, Heidelberg, Available for download at
-
Cremers, C.J.F.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008), Available for download at http://www.cs.ox.ac.uk/people/cas.cremers/scyther/index.html
-
(2008)
CAV 2008. LNCS
, vol.5123
, pp. 414-418
-
-
Cremers, C.J.F.1
-
12
-
-
85099527835
-
Beyond eCK: Perfect forward secrecy under actor compromise and ephemeral-key reveal
-
Cremers, C., Feltz, M.: Beyond eCK: Perfect forward secrecy under actor compromise and ephemeral-key reveal. Designs, Codes and Cryptography, 1-36 (2013)
-
(2013)
Designs, Codes and Cryptography
, pp. 1-36
-
-
Cremers, C.1
Feltz, M.2
-
15
-
-
84859327942
-
Guidelines on algorithms usage and key management
-
European Payments Council
-
European Payments Council. Guidelines on algorithms usage and key management. Technical report, EPC342-08 Version 1.1 (2009)
-
(2009)
Technical report, EPC342-08 Version 1.1
-
-
-
16
-
-
0032545823
-
Weakness in the Helsinki protocol
-
Horng, G., Hsu, C.-K.: Weakness in the Helsinki protocol. Electronics Letters 34(1), 354-355 (1998)
-
(1998)
Electronics Letters
, vol.34
, Issue.1
, pp. 354-355
-
-
Horng, G.1
Hsu, C.-K.2
-
18
-
-
84917694944
-
ISO/IEC 11770-2:2008, Information technology - Security techniques - Key Management - Part 2: Mechanisms using Symmetric Techniques, 2009
-
International Organization for Standardization, Genève, Switzerland, September
-
International Organization for Standardization, Genève, Switzerland. ISO/IEC 11770-2:2008, Information technology - Security techniques - Key Management - Part 2: Mechanisms using Symmetric Techniques, 2009. Incorporating corrigendum (September 2009)
-
(2009)
Incorporating corrigendum
-
-
-
20
-
-
77954613404
-
HMQV: A high-performance secure Diffie-Hellman protocol
-
Report 2005/176, (retrieved on June 1, 2014)
-
Krawczyk, H.: HMQV: A high-performance secure Diffie-Hellman protocol. Cryptology ePrint Archive, Report 2005/176 (2005), http://eprint.iacr.org/ (retrieved on June 1, 2014)
-
(2005)
Cryptology ePrint Archive
-
-
Krawczyk, H.1
-
21
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography 28, 119-134 (2003)
-
(2003)
Designs, Codes and Cryptography
, vol.28
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
24
-
-
0345412448
-
Fixing a problem in the Helsinki protocol
-
Mitchell, C.J., Yeun, C.Y.: Fixing a problem in the Helsinki protocol. SIGOPS Oper. Syst. Rev. 32(4), 21-24 (1998)
-
(1998)
SIGOPS Oper. Syst. Rev
, vol.32
, Issue.4
, pp. 21-24
-
-
Mitchell, C.J.1
Yeun, C.Y.2
|