-
1
-
-
84911908058
-
Know your enemy: Compromising adversaries in protocol analysis
-
17.2 (Nov. . ISSN: 1094-9224 (Visited on 04/11/ 2016
-
David Basin and Cas Cremers. "Know Your Enemy: Compromising Adversaries in Protocol Analysis". In: ACM Trans. Inf. Syst. Secur. 17.2 (Nov. 2014), 7:1-7:31. ISSN: 1094-9224. DOI: 10.1145/2658996. (Visited on 04/11/2016).
-
(2014)
ACM Trans. Inf. Syst. Secur.
, pp. 71-731
-
-
Basin, D.1
Cremers, C.2
-
3
-
-
34547313805
-
Stateful public-key cryptosystems: How to encrypt with one 160-bit exponentiation
-
New York, NY, USA: ACM (Visited on 11/10/ 2015
-
Mihir Bellare, Tadayoshi Kohno, and Victor Shoup. "Stateful Public-key Cryptosystems: How to Encrypt with One 160-bit Exponentiation". In: Proceedings of the 13th ACM Conference on Computer and Communications Security. CCS '06. New York, NY, USA: ACM, 2006, pp. 380-389. DOI: 10.1145/1180405.1180452. (Visited on 11/10/2015).
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security. CCS '06
, pp. 380-389
-
-
Bellare, M.1
Kohno, T.2
Shoup, V.3
-
4
-
-
84945119254
-
Entity authentication and key distribution
-
LNCS 773. Springer Berlin Heidelberg, Jan. 1 (Visited on 05/21/2014)
-
Mihir Bellare and Phillip Rogaway. "Entity Authentication and Key Distribution". In: Advances in Cryptology -CRYPTO '93. LNCS 773. Springer Berlin Heidelberg, Jan. 1, 1994, pp. 232-249. DOI: 10 . 1007 / 3 -540 -48329 -2 21. (Visited on 05/21/2014).
-
(1994)
Advances in Cryptology -CRYPTO '93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84949230533
-
Key agreement protocols and their security analysis
-
London, UK: Springer-Verlag
-
Simon Blake-Wilson, Don Johnson, and Alfred Menezes. "Key Agreement Protocols and Their Security Analysis". In: Proceedings of the 6th IMA International Conference on Cryptography and Coding. London, UK: Springer-Verlag, 1997, pp. 30-45.
-
(1997)
Proceedings of the 6th IMA International Conference on Cryptography and Coding
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
6
-
-
20444490057
-
Off-therecord communication, or, why not to use PGP
-
New York, NY, USA: ACM (Visited on 06/22/ 2015
-
Nikita Borisov, Ian Goldberg, and Eric Brewer. "Off-therecord Communication, or, Why Not to Use PGP". In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society. WPES '04. New York, NY, USA: ACM, 2004, pp. 77-84. DOI: 10.1145/1029179.1029200. (Visited on 06/22/2015).
-
(2004)
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society. WPES '04
, pp. 77-84
-
-
Borisov, N.1
Goldberg, I.2
Brewer, E.3
-
7
-
-
84883099622
-
Drifting Keys: Impersonation detection for constrained devices
-
2013 Proceedings IEEE INFOCOM. Apr.
-
K.D. Bowers et al. "Drifting Keys: Impersonation detection for constrained devices". In: 2013 Proceedings IEEE INFOCOM. 2013 Proceedings IEEE INFOCOM. Apr. 2013, pp. 1025-1033. DOI: 10.1109/INFCOM.2013.6566892.
-
(2013)
2013 Proceedings IEEE INFOCOM
, pp. 1025-1033
-
-
Bowers, K.D.1
-
8
-
-
80755168373
-
Composability of bellare-rogaway key exchange protocols
-
(Visited on 07/27/ 2015
-
Christina Brzuska et al. "Composability of Bellare-rogaway Key Exchange Protocols". In: CCS. ACM, 2011, pp. 51-62. DOI: 10.1145/2046707.2046716. (Visited on 07/27/2015).
-
(2011)
CCS ACM
, pp. 51-62
-
-
Brzuska, C.1
-
12
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
LNCS. Springer-Verlag
-
Ran Canetti and Hugo Krawczyk. "Analysis of key-exchange protocols and their use for building secure channels". In: EUROCRYPT. Vol. 2045. LNCS. Springer-Verlag, 2001, pp. 453-474.
-
(2001)
EUROCRYPT
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
16
-
-
84921068540
-
Beyond eCK: Perfect forward secrecy under actor compromise and ephemeralkey reveal English
-
Cas Cremers and Michèle Feltz. "Beyond eCK: perfect forward secrecy under actor compromise and ephemeralkey reveal". English. In: Designs, Codes and Cryptography (2013), pp. 1-36. DOI: 10.1007/s10623-013-9852-1.
-
(2013)
Designs, Codes and Cryptography
, pp. 1-36
-
-
Cremers, C.1
Feltz, M.2
-
17
-
-
84985936947
-
-
(visited on 02/11/ 2016 Nov. 2
-
Daniel Kahn Gillmor [TLS] OPTLS: Signature-less TLS 1.3. Nov. 2, 2014. URL: https://www.ietf.org/mail-archive/web/ tls/current/msg14423.html (visited on 02/11/2016).
-
(2014)
[TLS] OPTLS: Signature-less TLS 1.3
-
-
Kahn Gillmor, D.1
-
18
-
-
33749021102
-
Secure off-The-record Messaging
-
New York, NY, USA: ACM (Visited on 01/30/ 2014
-
Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk. "Secure Off-the-record Messaging". In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. WPES '05. New York, NY, USA: ACM, 2005, pp. 81-89. DOI: 10.1145/1102199.1102216. (Visited on 01/30/2014).
-
(2005)
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. WPES '05
, pp. 81-89
-
-
Di Raimondo, M.1
Gennaro, R.2
Krawczyk, H.3
-
19
-
-
84985923497
-
-
(visited on 11/07/ 2014
-
Tilman Frosch et al. How Secure is TextSecure' 904. 2014. URL: http://eprint.iacr.org/2014/904 (visited on 11/07/2014).
-
(2014)
How Secure Is TextSecure'
, vol.904
-
-
Frosch, T.1
-
21
-
-
77952405138
-
Forward security: Adaptive cryptography-time evolution
-
John Wiley and Sons
-
Gene Itkis. "Forward Security: Adaptive Cryptography -Time Evolution". In: Handbook of Information Security. Vol. 3. John Wiley and Sons, 2006.
-
(2006)
Handbook of Information Security
, vol.3
-
-
Itkis, G.1
-
25
-
-
84985988278
-
-
Nov. 12 (visited on 02/11/ 2016
-
Hugo Krawczyk. [TLS] OPTLS: Signature-less TLS 1.3. Nov. 12, 2014. URL: https://www.ietf.org/mail-archive/web/ tls/current/msg14592.html (visited on 02/11/2016).
-
(2014)
[TLS] OPTLS: Signature-less TLS 1.3
-
-
Krawczyk, H.1
-
26
-
-
84987654576
-
-
(visited on 02/01/ 2016
-
Hugo Krawczyk and Hoeteck Wee. The OPTLS Protocol and TLS 1.3. 978. 2015. URL: https://eprint.iacr.org/2015/978 (visited on 02/01/2016).
-
(2015)
The OPTLS Protocol and TLS 1
, vol.3
, pp. 978
-
-
Krawczyk, H.1
Wee, H.2
-
27
-
-
38149012093
-
Stronger security of authenticated key exchange
-
LNCS Springer
-
B.A. LaMacchia, K. Lauter, and A. Mityagin. "Stronger Security of Authenticated Key Exchange". In: ProvSec. Vol. 4784. LNCS. Springer, 2007, pp. 1-16. DOI: 10.1007/ 978-3-540-75670-5 1.
-
(2007)
ProvSec
, vol.4784
, pp. 1-16
-
-
LaMacchia, B.A.1
Lauter, K.2
Mityagin, A.3
-
28
-
-
84985922270
-
-
(visited on 06/22/ 2015
-
Adam Langley. Pond. 2014. URL: https://pond.imperialviolet. org/ (visited on 06/22/2015).
-
(2014)
Pond
-
-
Langley, A.1
-
29
-
-
84978084202
-
-
Nov. 26 (visited on 02/09/ 2016
-
Moxie Marlinspike. Advanced cryptographic ratcheting. Nov. 26, 2013. URL: https : / / whispersystems . org / blog / advanced-ratcheting/ (visited on 02/09/2016).
-
(2013)
Advanced Cryptographic Ratcheting
-
-
Marlinspike, M.1
-
31
-
-
84985934834
-
-
GitHub (visited on 06/22/ 2015
-
Trevor Perrin. trevp/axolotl. GitHub. 2014. URL: https:// github.com/trevp/axolotl (visited on 06/22/2015).
-
(2014)
Trevp/axolotl
-
-
Perrin, T.1
|