-
2
-
-
84944692964
-
-
May
-
David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé;, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella-Bé;guelin, Paul Zimmermann. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. May 2015. https://WeakDH.org
-
(2015)
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
-
-
Adrian, D.1
Bhargavan, K.2
Durumeric, Z.3
Gaudry, P.4
Green, M.5
Alex Halderman, J.6
Heninger, N.7
Springall, D.8
Thomé9
, E.10
Valenta, L.11
VanderSloot, B.12
Wustrow, E.13
Zanella-Bé14
guelin, S.15
Zimmermann, P.16
-
4
-
-
84865516206
-
Efficient padding oracle attacks on cryptographic hardware
-
Reihaneh Safavi-Naini and Ran Canetti, editors volume 7417 of Lecture Notes in Computer Science, Springer, August 2012
-
Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, and Joe-Kai Tsay. Efficient padding oracle attacks on cryptographic hardware. In Reihaneh Safavi-Naini and Ran Canetti, editors, Advances in Cryptology-CRYPTO 2012, volume 7417 of Lecture Notes in Computer Science, pages 608-625. Springer, August 2012.
-
(2012)
Advances in Cryptology-CRYPTO
, pp. 608-625
-
-
Bardou, R.1
Focardi, R.2
Kawamoto, Y.3
Simionato, L.4
Steel, G.5
Tsay, J.6
-
5
-
-
84910641096
-
-
Ahn et al. [ 3]
-
Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, and Douglas Stebila. Multi-ciphersuite security of the secure shell (SSH) protocol. In Ahn et al. [3], pages 369-381.
-
Multi-ciphersuite Security of the Secure Shell (SSH) Protocol
, pp. 369-381
-
-
Bergsma, F.1
Dowling, B.2
Kohlar, F.3
Schwenk, J.4
Stebila, D.5
-
6
-
-
44949237454
-
Elliptic curve cryptography (ecc) cipher suites for transport layer security (tls)
-
May Updated by RFC 5246
-
S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, and B. Moeller. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). RFC 4492 (Informational), May 2006. Updated by RFC 5246.
-
(2006)
RFC 4492 (Informational)
-
-
Blake-Wilson, S.1
Bolyard, N.2
Gupta, V.3
Hawk, C.4
Moeller, B.5
-
7
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
-
Hugo Krawczyk, editor volume 1462 of Lecture Notes in Computer Science, Springer, August
-
Daniel Bleichenbacher. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In Hugo Krawczyk, editor, Advances in Cryptology-CRYPTO'98, volume 1462 of Lecture Notes in Computer Science, pages 1-12. Springer, August 1998.
-
(1998)
Advances in Cryptology-CRYPTO'98
, pp. 1-12
-
-
Bleichenbacher, D.1
-
8
-
-
84910612876
-
-
Wan-Teh Chang and Adam Langley. QUIC crypto, 2013. https://docs.google.com/document/d/1g5nIXAIkN-Y-7XJW5K45IblHd-L2f5LTaDUDwvZ5L6g/edit?pli=1.
-
(2013)
QUIC Crypto
-
-
Chang, W.1
Langley, A.2
-
9
-
-
84857775893
-
On the joint security of encryption and signature in EMV
-
Orr Dunkelman, editor volume 7178 of Lecture Notes in Computer Science, Springer, February / March 2012
-
Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, and Mario Strefler. On the joint security of encryption and signature in EMV. In Orr Dunkelman, editor, Topics in Cryptology-CT-RSA 2012, volume 7178 of Lecture Notes in Computer Science, pages 116-135. Springer, February / March 2012.
-
Topics in Cryptology-CT-RSA 2012
, pp. 116-135
-
-
Paul Degabriele, J.1
Lehmann, A.2
Paterson, K.G.3
Smart, N.P.4
Strefler, M.5
-
11
-
-
33847753565
-
-
April Obsoleted by RFC 5246, updated by RFCs 4366, 4680, 4681, 5746
-
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 (Proposed Standard), April 2006. Obsoleted by RFC 5246, updated by RFCs 4366, 4680, 4681, 5746.
-
(2006)
The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 (Proposed Standard)
-
-
Dierks, T.1
Rescorla, E.2
-
14
-
-
84910593638
-
Multi-stage key exchange and the case of google's QUIC protocol
-
Gail-Joon Ahn, Moti Yung, and Ninghui Li, editors Scottsdale, AZ, USA, November 3-7, 2014, ACM, 2014
-
Marc Fischlin and Felix Günther Multi-stage key exchange and the case of google's QUIC protocol. In Gail-Joon Ahn, Moti Yung, and Ninghui Li, editors, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pages 1193-1204. ACM, 2014.
-
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
, pp. 1193-1204
-
-
Fischlin, M.1
Günther, F.2
-
15
-
-
84869429339
-
The most dangerous code in the world: Validating ssl certificates in non-browser software
-
Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, and Vitaly Shmatikov. The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software. In ACM Conference on Computer and Communications Security, 2012.
-
(2012)
ACM Conference on Computer and Communications Security
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
18
-
-
84865589043
-
Bleichenbacher's attack strikes again: Breaking PKCS#1 v1.5 in XML encryption
-
Sara Foresti, Moti Yung, and Fabio Martinelli, editors volume 7459 of Lecture Notes in Computer Science, Springer, September 2012
-
Tibor Jager, Sebastian Schinzel, and Juraj Somorovsky. Bleichenbacher's attack strikes again: Breaking PKCS#1 v1.5 in XML encryption. In Sara Foresti, Moti Yung, and Fabio Martinelli, editors, ESORICS 2012: 17th European Symposium on Research in Computer Security, volume 7459 of Lecture Notes in Computer Science, pages 752-769. Springer, September 2012.
-
ESORICS 2012: 17th European Symposium on Research in Computer Security
, pp. 752-769
-
-
Jager, T.1
Schinzel, S.2
Somorovsky, J.3
-
22
-
-
35248848850
-
Attacking rsa-based sessions in ssl/tls
-
Colin D. Walter, Çetin Kaya Koç, and Christof Paar, editors volume 2779 of Lecture Notes in Computer Science, Springer, September 2003
-
Vlastimil Klí;ma, Ondrej Pokorný;, and Tomá;s Rosa. Attacking RSA-based sessions in SSL/TLS. In Colin D. Walter, Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 426-440. Springer, September 2003.
-
(2003)
Cryptographic Hardware and Embedded Systems-CHES
, pp. 426-440
-
-
Klí1
ma, V.2
Pokorný3
, O.4
Rosa, T.5
-
23
-
-
84945194545
-
How secure and quick is QUIC? Provable security and performance analyses
-
SP 2015, San Jose, CA, USA, May 17-21, 2015, IEEE Computer Society
-
Robert Lychev, Samuel Jero, Alexandra Boldyreva, and Cristina Nita-Rotaru. How secure and quick is QUIC? Provable security and performance analyses. In 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, pages 214-231. IEEE Computer Society, 2015.
-
(2015)
2015 IEEE Symposium on Security and Privacy
, pp. 214-231
-
-
Lychev, R.1
Jero, S.2
Boldyreva, A.3
Nita-Rotaru, C.4
-
24
-
-
84954154587
-
ATM signalling support for IP over atm-uni signalling 4.0 update
-
April
-
M. Maher. ATM Signalling Support for IP over ATM-UNI Signalling 4.0 Update. RFC 2331 (Proposed Standard), April 1998.
-
(1998)
RFC 2331 (Proposed Standard)
-
-
Maher, M.1
-
25
-
-
33846862428
-
A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0
-
Joe Kilian, editor volume 2139 of Lecture Notes in Computer Science, Springer, August 2001
-
James Manger. A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0. In Joe Kilian, editor, Advances in Cryptology-CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 230-238. Springer, August 2001.
-
(2001)
Advances in Cryptology-CRYPTO
, pp. 230-238
-
-
Manger, J.1
-
28
-
-
85061943650
-
Revisiting ssl/tls implementations: New bleichenbacher side channels and attacks
-
San Diego, CA, USA, August 20-22, 2014
-
Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jörg Schwenk, Sebastian Schinzel, and Erik Tews. Revisiting SSL/TLS implementations: New bleichenbacher side channels and attacks. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., pages 733-748, 2014.
-
(2014)
Proceedings of the 23rd USENIX Security Symposium
, pp. 733-748
-
-
Meyer, C.1
Somorovsky, J.2
Weiss, E.3
Schwenk, J.4
Schinzel, S.5
Tews, E.6
-
29
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Ehab Al-Shaer, Somesh Jha, and Angelos D. Keromytis, editors ACM Press, November
-
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Ehab Al-Shaer, Somesh Jha, and Angelos D. Keromytis, editors, ACM CCS 09: 16th Conference on Computer and Communications Security, pages 199-212. ACM Press, November 2009.
-
(2009)
ACM CCS 09: 16th Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
30
-
-
85027004652
-
Bulletproof ssl tls understanding and deploying ssl/tls and pki to secure servers and web applications
-
August
-
Ivan Ristić;. Bulletproof SSL and TLS. Understanding and deploying SSL/TLS and PKI to secure servers and web applications. Feisty Duck, August 2014.
-
(2014)
Feisty Duck
-
-
Ristić, I.1
-
32
-
-
84977947706
-
-
Jim Roskind. QUIC design document, 2013. https://docs.google.com/a/chromium.org/document/d/1RNHkx-VvKWyWg6Lr8SZ-saqsQx7rFV-ev2jRFUoVD34.
-
(2013)
QUIC Design Document
-
-
Roskind, J.1
|