메뉴 건너뛰기




Volumn 2015-October, Issue , 2015, Pages 1197-1210

A cryptographic analysis of the TLS 1.3 handshake protocol candidates

Author keywords

Composition; Key exchange; Protocol analysis; Transport Layer Security (TLS)

Indexed keywords

CHEMICAL ANALYSIS; CRYPTOGRAPHY; SEEBECK EFFECT; STANDARDIZATION;

EID: 84954140761     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2810103.2813653     Document Type: Conference Paper
Times cited : (96)

References (27)
  • 6
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO'93, pages 232-249, 1994.
    • (1994) CRYPTO'93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 11
    • 84910685897 scopus 로고    scopus 로고
    • PhD thesis, Technische Universität Darmstadt, Darmstadt, Germany
    • C. Brzuska. On the Foundations of Key Exchange. PhD thesis, Technische Universität Darmstadt, Darmstadt, Germany, 2013. http://tuprints.ulb.tu-darmstadt.de/3414/.
    • (2013) On the Foundations of Key Exchange
    • Brzuska, C.1
  • 12
  • 13
    • 84869635960 scopus 로고    scopus 로고
    • Security analysis of IKE's signature-based key-exchange protocol
    • R. Canetti and H. Krawczyk. Security analysis of IKE's signature-based key-exchange protocol. In CRYPTO 2002, pages 143-161, 2002. http://eprint.iacr.org/2002/120/.
    • (2002) CRYPTO 2002 , pp. 143-161
    • Canetti, R.1    Krawczyk, H.2
  • 16
    • 84909609186 scopus 로고    scopus 로고
    • T. Duong. BEAST. http://vnhacker.blogspot.com.au/2011/09/beast.html, 2011.
    • (2011) BEAST
    • Duong, T.1
  • 17
    • 84910593638 scopus 로고    scopus 로고
    • Multi-stage key exchange and the case of Google's QUIC protocol
    • M. Fischlin and F. Günther. Multi-stage key exchange and the case of Google's QUIC protocol. In ACM CCS 14, pages 1193-1204, 2014.
    • (2014) ACM CCS 14 , pp. 1193-1204
    • Fischlin, M.1    Günther, F.2
  • 18
    • 80755169483 scopus 로고    scopus 로고
    • Modular code-based cryptographic verification
    • C. Fournet, M. Kohlweiss, and P.-Y. Strub. Modular code-based cryptographic verification. In ACM CCS 11, pages 341-350, 2011.
    • (2011) ACM CCS 11 , pp. 341-350
    • Fournet, C.1    Kohlweiss, M.2    Strub, P.-Y.3
  • 19
    • 84865461888 scopus 로고    scopus 로고
    • On the security of TLS-DHE in the standard model
    • T. Jager, F. Kohlar, S. Schäge, and J. Schwenk. On the security of TLS-DHE in the standard model. In CRYPTO 2012, pages 273-293, 2012.
    • (2012) CRYPTO 2012 , pp. 273-293
    • Jager, T.1    Kohlar, F.2    Schäge, S.3    Schwenk, J.4
  • 22
    • 77957013995 scopus 로고    scopus 로고
    • Cryptographic extraction and key derivation: The HKDF scheme
    • H. Krawczyk. Cryptographic extraction and key derivation: The HKDF scheme. In CRYPTO 2010, pages 631-648, 2010.
    • (2010) CRYPTO 2010 , pp. 631-648
    • Krawczyk, H.1
  • 23
    • 84884484198 scopus 로고    scopus 로고
    • On the security of the TLS protocol: A systematic analysis
    • H. Krawczyk, K. G. Paterson, and H. Wee. On the security of the TLS protocol: A systematic analysis. In CRYPTO 2013, Part I, pages 429-448, 2013.
    • (2013) CRYPTO 2013, Part i , pp. 429-448
    • Krawczyk, H.1    Paterson, K.G.2    Wee, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.