-
1
-
-
84954137569
-
Imperfect forward secrecy: How Diffie-Hellman fails in practice
-
D. Adrian, K. Bhargavan, Z. Durumeric, P. Gaudry, M. Green, J. A. Halderman, N. Heninger, D. Springall, E. Thomé;, L. Valenta, B. VanderSloot, E. Wustrow, S. Zanella-Bé;guelin, and P. Zimmermann. Imperfect forward secrecy: How Diffie-Hellman fails in practice. In ACM CCS 15, 2015.
-
(2015)
ACM CCS 15
-
-
Adrian, D.1
Bhargavan, K.2
Durumeric, Z.3
Gaudry, P.4
Green, M.5
Halderman, J.A.6
Heninger, N.7
Springall, D.8
Thomé9
, E.10
Valenta, L.11
VanderSloot, B.12
Wustrow, E.13
Zanella-Bé14
guelin, S.15
Zimmermann, P.16
-
2
-
-
85019748703
-
On the security of RC4 in TLS
-
N. AlFardan, D. J. Bernstein, K. G. Paterson, B. Poettering, and J. C. N. Schuldt. On the security of RC4 in TLS. In Proc. 22nd USENIX Security Symposium, pages 305-320, 2013.
-
(2013)
Proc. 22nd USENIX Security Symposium
, pp. 305-320
-
-
AlFardan, N.1
Bernstein, D.J.2
Paterson, K.G.3
Poettering, B.4
Schuldt, J.C.N.5
-
5
-
-
84943408918
-
-
C. Badertscher, C. Matt, U. Maurer, P. Rogaway, and B. Tackmann. Augmented secure channels and the goal of the TLS 1.3 record layer. Cryptology ePrint Archive, Report 2015/394, 2015. http://eprint.iacr.org/2015/394.
-
(2015)
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer. Cryptology EPrint Archive Report 2015/394
-
-
Badertscher, C.1
Matt, C.2
Maurer, U.3
Rogaway, P.4
Tackmann, B.5
-
6
-
-
84945119254
-
Entity authentication and key distribution
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO'93, pages 232-249, 1994.
-
(1994)
CRYPTO'93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
84940995903
-
A messy state of the union: Taming the composite state machines of TLS
-
B. Beurdouche, K. Bhargavan, A. Delignat-Levaud, C. Fournet, M. Kohlweiss, A. Pironti, P.-Y. Strub, and J. K. Zinzindohoue. A messy state of the union: Taming the composite state machines of TLS. In Proc. IEEE Symp. on Security & Privacy (S&P) 2015, pages 535-552, 2015.
-
(2015)
Proc. IEEE Symp. on Security & Privacy (S&P) 2015
, pp. 535-552
-
-
Beurdouche, B.1
Bhargavan, K.2
Delignat-Levaud, A.3
Fournet, C.4
Kohlweiss, M.5
Pironti, A.6
Strub, P.-Y.7
Zinzindohoue, J.K.8
-
8
-
-
84914174218
-
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
-
K. Bhargavan, A. Delignat-Lavaud, C. Fournet, A. Pironti, and P.-Y. Strub. Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS. In 2014 IEEE Symposium on Security and Privacy, pages 98-113, 2014.
-
(2014)
2014 IEEE Symposium on Security and Privacy
, pp. 98-113
-
-
Bhargavan, K.1
Delignat-Lavaud, A.2
Fournet, C.3
Pironti, A.4
Strub, P.-Y.5
-
9
-
-
84881234333
-
Implementing tls with verified cryptographic security
-
K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, and P.-Y. Strub. Implementing TLS with verified cryptographic security. In 2013 IEEE Symposium on Security and Privacy, pages 445-459, 2013.
-
(2013)
2013 IEEE Symposium on Security and Privacy
, pp. 445-459
-
-
Bhargavan, K.1
Fournet, C.2
Kohlweiss, M.3
Pironti, A.4
Strub, P.-Y.5
-
10
-
-
84905401236
-
Proving the TLS handshake secure (as it is)
-
K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, P.-Y. Strub, and S. Zanella Bé;guelin. Proving the TLS handshake secure (as it is). In CRYPTO 2014, Part II, pages 235-255, 2014.
-
(2014)
CRYPTO 2014, Part II
, pp. 235-255
-
-
Bhargavan, K.1
Fournet, C.2
Kohlweiss, M.3
Pironti, A.4
Strub, P.-Y.5
Zanella Bé6
guelin, S.7
-
11
-
-
84910685897
-
-
PhD thesis, Technische Universität Darmstadt, Darmstadt, Germany
-
C. Brzuska. On the Foundations of Key Exchange. PhD thesis, Technische Universität Darmstadt, Darmstadt, Germany, 2013. http://tuprints.ulb.tu-darmstadt.de/3414/.
-
(2013)
On the Foundations of Key Exchange
-
-
Brzuska, C.1
-
12
-
-
80755168373
-
Composability of bellare-rogaway key exchange protocols
-
C. Brzuska, M. Fischlin, B. Warinschi, and S. C. Williams. Composability of Bellare-Rogaway key exchange protocols. In ACM CCS 11, pages 51-62, 2011.
-
(2011)
ACM CCS 11
, pp. 51-62
-
-
Brzuska, C.1
Fischlin, M.2
Warinschi, B.3
Williams, S.C.4
-
13
-
-
84869635960
-
Security analysis of IKE's signature-based key-exchange protocol
-
R. Canetti and H. Krawczyk. Security analysis of IKE's signature-based key-exchange protocol. In CRYPTO 2002, pages 143-161, 2002. http://eprint.iacr.org/2002/120/.
-
(2002)
CRYPTO 2002
, pp. 143-161
-
-
Canetti, R.1
Krawczyk, H.2
-
16
-
-
84909609186
-
-
T. Duong. BEAST. http://vnhacker.blogspot.com.au/2011/09/beast.html, 2011.
-
(2011)
BEAST
-
-
Duong, T.1
-
17
-
-
84910593638
-
Multi-stage key exchange and the case of Google's QUIC protocol
-
M. Fischlin and F. Günther. Multi-stage key exchange and the case of Google's QUIC protocol. In ACM CCS 14, pages 1193-1204, 2014.
-
(2014)
ACM CCS 14
, pp. 1193-1204
-
-
Fischlin, M.1
Günther, F.2
-
18
-
-
80755169483
-
Modular code-based cryptographic verification
-
C. Fournet, M. Kohlweiss, and P.-Y. Strub. Modular code-based cryptographic verification. In ACM CCS 11, pages 341-350, 2011.
-
(2011)
ACM CCS 11
, pp. 341-350
-
-
Fournet, C.1
Kohlweiss, M.2
Strub, P.-Y.3
-
19
-
-
84865461888
-
On the security of TLS-DHE in the standard model
-
T. Jager, F. Kohlar, S. Schäge, and J. Schwenk. On the security of TLS-DHE in the standard model. In CRYPTO 2012, pages 273-293, 2012.
-
(2012)
CRYPTO 2012
, pp. 273-293
-
-
Jager, T.1
Kohlar, F.2
Schäge, S.3
Schwenk, J.4
-
21
-
-
84951872966
-
(De-) constructing TLS
-
M. Kohlweiss, U. Maurer, C. Onete, B. Tackmann, and D. Venturi. (de-)constructing TLS. Cryptology ePrint Archive, Report 2014/020, 2014. http://eprint.iacr.org/2014/020.
-
(2014)
Cryptology EPrint Archive, Report 2014/ 020
-
-
Kohlweiss, M.1
Maurer, U.2
Onete, C.3
Tackmann, B.4
Venturi, D.5
-
22
-
-
77957013995
-
Cryptographic extraction and key derivation: The HKDF scheme
-
H. Krawczyk. Cryptographic extraction and key derivation: The HKDF scheme. In CRYPTO 2010, pages 631-648, 2010.
-
(2010)
CRYPTO 2010
, pp. 631-648
-
-
Krawczyk, H.1
-
23
-
-
84884484198
-
On the security of the TLS protocol: A systematic analysis
-
H. Krawczyk, K. G. Paterson, and H. Wee. On the security of the TLS protocol: A systematic analysis. In CRYPTO 2013, Part I, pages 429-448, 2013.
-
(2013)
CRYPTO 2013, Part i
, pp. 429-448
-
-
Krawczyk, H.1
Paterson, K.G.2
Wee, H.3
|