-
1
-
-
67649574667
-
-
NIST Special Publication, National Institute of Standards &Technology, Aug
-
E. Barker, L. Chen, A. Regenscheid, and M. Smid. SP 800-56B. Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography. NIST Special Publication, National Institute of Standards &Technology, Aug. 2009
-
(2009)
SP 800-56B Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography
-
-
Barker, E.1
Chen, L.2
Regenscheid, A.3
Smid, M.4
-
2
-
-
67649574667
-
-
NIST Special Publication, National Institute of Standards &Technology, May
-
E. Barker, L. Chen, A. Roginsky, and M. Smid. SP 800-56A r2. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. NIST Special Publication, National Institute of Standards &Technology, May 2013
-
(2013)
SP 800-56A r2. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
-
-
Barker, E.1
Chen, L.2
Roginsky, A.3
Smid, M.4
-
3
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
B. Preneel, editor, Springer, Heidelberg, May
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In B. Preneel, editor, Advances in Cryptology-EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 139-155. Springer, Heidelberg, May 2000
-
(2000)
Advances in Cryptology-EUROCRYPT 2000, Volume 1807 of Lecture Notes in Computer Science
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
84945119254
-
Entity authentication and key distribution
-
D. R. Stinson, editor, Springer, Heidelberg, Aug
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In D. R. Stinson, editor, Advances in Cryptology-CRYPTO'93, volume 773 of Lecture Notes in Computer Science, pages 232-249. Springer, Heidelberg, Aug. 1994
-
(1994)
Advances in Cryptology-CRYPTO'93, Volume 773 of Lecture Notes in Computer Science
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84910641096
-
Multiciphersuite security of the secure shell (SSH) protocol
-
G.-J. Ahn, M. Yung, and N. Li, editors, ACM Press, Nov
-
F. Bergsma, B. Dowling, F. Kohlar, J. Schwenk, and D. Stebila. Multiciphersuite security of the secure shell (SSH) protocol. In G.-J. Ahn, M. Yung, and N. Li, editors, ACM CCS 14: 21st Conference on Computer and Communications Security, pages 369-381. ACM Press, Nov. 2014
-
(2014)
ACM CCS 14: 21st Conference on Computer and Communications Security
, pp. 369-381
-
-
Bergsma, F.1
Dowling, B.2
Kohlar, F.3
Schwenk, J.4
Stebila, D.5
-
6
-
-
84914174218
-
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
-
IEEE Computer Society Press, May
-
K. Bhargavan, A. Delignat-Lavaud, C. Fournet, A. Pironti, and P.-Y. Strub. Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS. In 2014 IEEE Symposium on Security and Privacy, pages 98-113. IEEE Computer Society Press, May 2014
-
(2014)
2014 IEEE Symposium on Security and Privacy
, pp. 98-113
-
-
Bhargavan, K.1
Delignat-Lavaud, A.2
Fournet, C.3
Pironti, A.4
Strub, P.-Y.5
-
7
-
-
84881234333
-
Implementing TLS with verified cryptographic security
-
IEEE Computer Society Press, May
-
K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, and P.-Y. Strub. Implementing TLS with verified cryptographic security. In 2013 IEEE Symposium on Security and Privacy, pages 445-459. IEEE Computer Society Press, May 2013
-
(2013)
2013 IEEE Symposium on Security and Privacy
, pp. 445-459
-
-
Bhargavan, K.1
Fournet, C.2
Kohlweiss, M.3
Pironti, A.4
Strub, P.-Y.5
-
8
-
-
84949230533
-
Key agreement protocols and their security analysis
-
M. Darnell, editor, Springer Berlin Heidelberg
-
S. Blake-Wilson, D. Johnson, and A. Menezes. Key agreement protocols and their security analysis. In M. Darnell, editor, Crytography and Coding, volume 1355 of Lecture Notes in Computer Science, pages 30-45. Springer Berlin Heidelberg, 1997
-
(1997)
Crytography and Coding, Volume 1355 of Lecture Notes in Computer Science
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
9
-
-
84949221411
-
Authenticated Diffie-Hellman key agreement protocols (invited talk)
-
S. E. Tavares and H. Meijer, editors, Springer, Heidelberg, Aug
-
S. Blake-Wilson and A. Menezes. Authenticated Diffie-Hellman key agreement protocols (invited talk). In S. E. Tavares and H. Meijer, editors, SAC 1998: 5th Annual International Workshop on Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, pages 339-361. Springer, Heidelberg, Aug. 1999
-
(1999)
SAC 1998: 5th Annual International Workshop on Selected Areas in Cryptography, Volume 1556 of Lecture Notes in Computer Science
, pp. 339-361
-
-
Blake-Wilson, S.1
Menezes, A.2
-
10
-
-
84956866842
-
Unknown key-share attacks on the station-to-station (STS) protocol
-
H. Imai and Y. Zheng, editors, Springer, Heidelberg, Mar
-
S. Blake-Wilson and A. Menezes. Unknown key-share attacks on the station-to-station (STS) protocol. In H. Imai and Y. Zheng, editors, PKC'99: 2nd International Workshop on Theory and Practice in Public Key Cryptography, volume 1560 of Lecture Notes in Computer Science, pages 154-170. Springer, Heidelberg, Mar. 1999
-
(1999)
PKC'99: 2nd International Workshop on Theory and Practice in Public Key Cryptography, Volume 1560 of Lecture Notes in Computer Science
, pp. 154-170
-
-
Blake-Wilson, S.1
Menezes, A.2
-
11
-
-
83755180769
-
On forward secrecy in one-round key exchange
-
L. Chen, editor, Springer Berlin Heidelberg
-
C. Boyd and J. Nieto. On forward secrecy in one-round key exchange. In L. Chen, editor, Cryptography and Coding, volume 7089 of Lecture Notes in Computer Science, pages 451-468. Springer Berlin Heidelberg, 2011
-
(2011)
Cryptography and Coding, Volume 7089 of Lecture Notes in Computer Science
, pp. 451-468
-
-
Boyd, C.1
Nieto, J.2
-
12
-
-
84910685897
-
-
PhD thesis, Technische Universität Darmstadt, Darmstadt, Germany
-
C. Brzuska. On the Foundations of Key Exchange. PhD thesis, Technische Universität Darmstadt, Darmstadt, Germany, 2013. http://tuprints.ulb.tu-darmstadt.de/3414
-
(2013)
On the Foundations of Key Exchange
-
-
Brzuska, C.1
-
13
-
-
80755168373
-
Composability of Bellare-Rogaway key exchange protocols
-
Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Press, Oct
-
C. Brzuska, M. Fischlin, B. Warinschi, and S. C. Williams. Composability of Bellare-Rogaway key exchange protocols. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM CCS 11: 18th Conference on Computer and Communications Security, pages 51-62. ACM Press, Oct. 2011
-
(2011)
ACM CCS 11: 18th Conference on Computer and Communications Security
, pp. 51-62
-
-
Brzuska, C.1
Fischlin, M.2
Warinschi, B.3
Williams, S.C.4
-
14
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
B. Pfitzmann, editor, Springer, Heidelberg, May
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In B. Pfitzmann, editor, Advances in Cryptology-EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 453-474. Springer, Heidelberg, May 2001
-
(2001)
Advances in Cryptology-EUROCRYPT 2001, Volume 2045 of Lecture Notes in Computer Science
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
15
-
-
84942246351
-
Identity based authenticated key agreement protocols from pairings
-
IEEE Computer Society, June
-
L. Chen and C. Kudla. Identity based authenticated key agreement protocols from pairings. In 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), pages 219-233. IEEE Computer Society, June 2003
-
(2003)
16th IEEE Computer Security Foundations Workshop (CSFW-16 2003)
, pp. 219-233
-
-
Chen, L.1
Kudla, C.2
-
16
-
-
84865584040
-
Beyond eCK: Perfect forward secrecy under actor compromise and ephemeral-key reveal
-
S. Foresti, M. Yung, and F. Martinelli, editors, Springer, Heidelberg, Sept
-
C. J. F. Cremers and M. Feltz. Beyond eCK: Perfect forward secrecy under actor compromise and ephemeral-key reveal. In S. Foresti, M. Yung, and F. Martinelli, editors, ESORICS 2012: 17th European Symposium on Research in Computer Security, volume 7459 of Lecture Notes in Computer Science, pages 734-751. Springer, Heidelberg, Sept. 2012
-
(2012)
ESORICS 2012: 17th European Symposium on Research in Computer Security, Volume 7459 of Lecture Notes in Computer Science
, pp. 734-751
-
-
Cremers, C.J.F.1
Feltz, M.2
-
17
-
-
77956573382
-
The transport layer security (TLS) protocol version 1.2
-
Aug. Updated by RFCs 5746, 5878, 6176
-
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), Aug. 2008. Updated by RFCs 5746, 5878, 6176
-
(2008)
RFC 5246 (Proposed Standard)
-
-
Dierks, T.1
Rescorla, E.2
-
18
-
-
84954140761
-
A cryptographic analysis of the TLS 1.3 handshake protocol candidates
-
I. Ray, N. Li, and C. Kruegel:, editors, ACM Press, Oct
-
B. Dowling, M. Fischlin, F. Günther, and D. Stebila. A cryptographic analysis of the TLS 1.3 handshake protocol candidates. In I. Ray, N. Li, and C. Kruegel:, editors, ACM CCS 15: 22nd Conference on Computer and Communications Security, pages 1197-1210. ACM Press, Oct. 2015
-
(2015)
ACM CCS 15: 22nd Conference on Computer and Communications Security
, pp. 1197-1210
-
-
Dowling, B.1
Fischlin, M.2
Günther, F.3
Stebila, D.4
-
19
-
-
84987645440
-
A cryptographic analysis of the TLS 1.3 draft-10 full and pre-shared key handshake protocol
-
B. Dowling, M. Fischlin, F. Günther, and D. Stebila. A cryptographic analysis of the TLS 1.3 draft-10 full and pre-shared key handshake protocol. Cryptology ePrint Archive, Report 2016/081, 2016. http://eprint.iacr.org/2016/081
-
(2016)
Cryptology EPrint Archive, Report 2016/081
-
-
Dowling, B.1
Fischlin, M.2
Günther, F.3
Stebila, D.4
-
20
-
-
84987670803
-
-
EMVCo LLC. EMV ECC key establishment protocols. http://www.emvco.com/specifications.aspx?id=243, 2012
-
(2012)
-
-
-
22
-
-
84865461888
-
On the security of TLSDHE in the standard model
-
R. Safavi-Naini and R. Canetti, editors, Springer, Heidelberg, Aug
-
T. Jager, F. Kohlar, S. Schäge, and J. Schwenk. On the security of TLSDHE in the standard model. In R. Safavi-Naini and R. Canetti, editors, Advances in Cryptology-CRYPTO 2012, volume 7417 of Lecture Notes in Computer Science, pages 273-293. Springer, Heidelberg, Aug. 2012
-
(2012)
Advances in Cryptology-CRYPTO 2012, Volume 7417 of Lecture Notes in Computer Science
, pp. 273-293
-
-
Jager, T.1
Kohlar, F.2
Schäge, S.3
Schwenk, J.4
-
23
-
-
33745179557
-
HMQV: A high-performance secure Diffie-Hellman protocol
-
V. Shoup, editor, Springer, Heidelberg, Aug
-
H. Krawczyk. HMQV: A high-performance secure Diffie-Hellman protocol. In V. Shoup, editor, Advances in Cryptology-CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, pages 546-566. Springer, Heidelberg, Aug. 2005
-
(2005)
Advances in Cryptology-CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science
, pp. 546-566
-
-
Krawczyk, H.1
-
24
-
-
84884484198
-
On the security of the TLS protocol: A systematic analysis
-
R. Canetti and J. A. Garay, editors, Springer, Heidelberg, Aug
-
H. Krawczyk, K. G. Paterson, and H. Wee. On the security of the TLS protocol: A systematic analysis. In R. Canetti and J. A. Garay, editors, Advances in Cryptology-CRYPTO 2013, Part I, volume 8042 of Lecture Notes in Computer Science, pages 429-448. Springer, Heidelberg, Aug. 2013
-
(2013)
Advances in Cryptology-CRYPTO 2013, Part I, Volume 8042 of Lecture Notes in Computer Science
, pp. 429-448
-
-
Krawczyk, H.1
Paterson, K.G.2
Wee, H.3
-
25
-
-
38149012093
-
Stronger security of authenticated key exchange
-
Springer, Nov
-
B. A. LaMacchia, K. E. Lauter, and A. Mityagin. Stronger security of authenticated key exchange. In Provable Security, First International Conference, ProvSec 2007, volume 4784 of Lecture Notes in Computer Science, pages 1-16. Springer, Nov. 2007
-
(2007)
Provable Security, First International Conference, ProvSec 2007, Volume 4784 of Lecture Notes in Computer Science
, pp. 1-16
-
-
LaMacchia, B.A.1
Lauter, K.E.2
Mityagin, A.3
-
28
-
-
73849111632
-
The TLS handshake protocol: A modular analysis
-
Apr
-
P. Morrissey, N. P. Smart, and B. Warinschi. The TLS handshake protocol: A modular analysis. Journal of Cryptology, 23(2):187-223, Apr. 2010
-
(2010)
Journal of Cryptology
, vol.23
, Issue.2
, pp. 187-223
-
-
Morrissey, P.1
Smart, N.P.2
Warinschi, B.3
|