메뉴 건너뛰기




Volumn , Issue , 2017, Pages 483-502

Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 85024490593     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2017.26     Document Type: Conference Paper
Times cited : (175)

References (73)
  • 2
    • 84978976378 scopus 로고    scopus 로고
    • Lucky microseconds: A timing attack on Amazon's S2N implementation of TLS
    • M. R. Albrecht and K. G. Paterson, "Lucky microseconds: A timing attack on Amazon's S2N implementation of TLS, " in EUROCRYPT, 2016, pp. 622-643.
    • (2016) EUROCRYPT , pp. 622-643
    • Albrecht, M.R.1    Paterson, K.G.2
  • 5
    • 84979523456 scopus 로고    scopus 로고
    • Verifiable side-channel security of cryptographic implementations: Constant-time MEE-CBC
    • J. B. Almeida, M. Barbosa, G. Barthe, and F. Dupressoir, "Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC, " in Fast Software Encryption (FSE), 2016, pp. 163-184.
    • (2016) Fast Software Encryption (FSE) , pp. 163-184
    • Almeida, J.B.1    Barbosa, M.2    Barthe, G.3    Dupressoir, F.4
  • 9
    • 33749544409 scopus 로고    scopus 로고
    • New proofs for NMAC and HMAC: Security without collision-resistance
    • M. Bellare, "New proofs for NMAC and HMAC: Security without collision-resistance, " in Advances in Cryptology (CRYPTO), 2006, pp. 602-619.
    • (2006) Advances in Cryptology (CRYPTO) , pp. 602-619
    • Bellare, M.1
  • 10
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Dec.
    • M. Bellare, J. Kilian, and P. Rogaway, "The security of the cipher block chaining message authentication code, " Journal of Computer and System Sciences, vol. 61, no. 3, pp. 362-399, Dec. 2000.
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 11
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, " in Advances in Cryptology-ASIACRYPT'00, 2000, pp. 531-545.
    • (2000) Advances in Cryptology-ASIACRYPT'00 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 13
    • 85024476668 scopus 로고    scopus 로고
    • Verified models and reference implementations for the TLS 1. 3 standard candidate
    • K. Bhargavan, B. Blanchet, and N. Kobeissi, "Verified models and reference implementations for the TLS 1. 3 standard candidate, " Inria, Research report RR-9040, 2017.
    • (2017) Inria, Research Report RR-9040
    • Bhargavan, K.1    Blanchet, B.2    Kobeissi, N.3
  • 18
    • 84859467774 scopus 로고    scopus 로고
    • Verified cryptographic implementations for TLS
    • K. Bhargavan, C. Fournet, R. Corin, and E. Z?alinescu, "Verified cryptographic implementations for TLS, " ACM TOPLAS, vol. 15, no. 1, pp. 3:1-3:32, 2012.
    • (2012) ACM TOPLAS , vol.15 , Issue.1 , pp. 31-332
    • Bhargavan, K.1    Fournet, C.2    Corin, R.3    Zalinescu, E.4
  • 24
    • 55949087657 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • B. Blanchet, "A computationally sound mechanized prover for security protocols, " IEEE Transactions on Dependable and Secure Computing, vol. 5, no. 4, pp. 193-207, 2008.
    • (2008) IEEE Transactions on Dependable and Secure Computing , vol.5 , Issue.4 , pp. 193-207
    • Blanchet, B.1
  • 25
    • 68249091950 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • -, "Automatic verification of correspondences for security protocols, " Journal of Computer Security, vol. 17, no. 4, pp. 363-434, 2009.
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 363-434
    • Blanchet, B.1
  • 26
    • 84859357099 scopus 로고    scopus 로고
    • Security protocol verification: Symbolic and computational models
    • -, "Security protocol verification: Symbolic and computational models, " in Principles of Security and Trust (POST), 2012, pp. 3-29.
    • (2012) Principles of Security and Trust (POST) , pp. 3-29
    • Blanchet, B.1
  • 27
    • 85024503283 scopus 로고    scopus 로고
    • Modeling and verifying security protocols with the applied pi calculus and ProVerif
    • Oct.
    • -, "Modeling and verifying security protocols with the applied pi calculus and ProVerif, " Foundations and Trends in Privacy and Security, vol. 1, no. 1-2, pp. 1-135, Oct. 2016.
    • (2016) Foundations and Trends in Privacy and Security , vol.1 , Issue.1-2 , pp. 1-135
    • Blanchet, B.1
  • 30
    • 84936762208 scopus 로고    scopus 로고
    • Proved generation of implementations from computationally secure protocol specifications
    • D. Cadé and B. Blanchet, "Proved generation of implementations from computationally secure protocol specifications, " Journal of Computer Security, vol. 23, no. 3, pp. 331-402, 2015.
    • (2015) Journal of Computer Security , vol.23 , Issue.3 , pp. 331-402
    • Cadé, D.1    Blanchet, B.2
  • 34
    • 79956129556 scopus 로고    scopus 로고
    • A survey of symbolic methods in computational analysis of cryptographic systems
    • V. Cortier, S. Kremer, and B. Warinschi, "A survey of symbolic methods in computational analysis of cryptographic systems, " Journal of Automated Reasoning, vol. 46, no. 3-4, pp. 225-259, 2011.
    • (2011) Journal of Automated Reasoning , vol.46 , Issue.3-4 , pp. 225-259
    • Cortier, V.1    Kremer, S.2    Warinschi, B.3
  • 36
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • I. B. Damg?ard, "A design principle for hash functions, " in Advances in Cryptology-CRYPTO89, 1989, pp. 416-427.
    • (1989) Advances in Cryptology-CRYPTO89 , pp. 416-427
    • Damgard, I.B.1
  • 37
    • 70450184286 scopus 로고    scopus 로고
    • The transport layer security (TLS) protocol version 1. 2
    • T. Dierks and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1. 2, " IETF RFC 5246, 2008.
    • (2008) IETF RFC 5246
    • Dierks, T.1    Rescorla, E.2
  • 39
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. C. Yao, "On the security of public key protocols, " IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-207, 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-207
    • Dolev, D.1    Yao, A.C.2
  • 43
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks, " SIAM Journal of Computing, vol. 17, no. 2, pp. 281-308, April 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 45
    • 0004257933 scopus 로고
    • IETF Internet Draft
    • K. E. Hickman, "The SSL protocol, " 1995, IETF Internet Draft, https: //tools. ietf. org/html/draft-hickman-netscape-ssl-00.
    • (1995) The SSL Protocol
    • Hickman, K.E.1
  • 46
    • 84865461888 scopus 로고    scopus 로고
    • On the security of TLS-DHE in the standard model
    • T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, "On the security of TLS-DHE in the standard model, " in CRYPTO 2012, 2012, pp. 273-293.
    • (2012) CRYPTO 2012 , pp. 273-293
    • Jager, T.1    Kohlar, F.2    Schäge, S.3    Schwenk, J.4
  • 49
    • 77957013995 scopus 로고    scopus 로고
    • Cryptographic extraction and key derivation: The HKDF scheme
    • H. Krawczyk, "Cryptographic extraction and key derivation: The HKDF scheme, " in Advances in Cryptology (CRYPTO), 2010, pp. 631-648.
    • (2010) Advances in Cryptology (CRYPTO) , pp. 631-648
    • Krawczyk, H.1
  • 50
    • 84995394445 scopus 로고    scopus 로고
    • A unilateral-to-mutual authentication compiler for key exchange (with applications to client authentication in tls 1. 3)
    • -, "A unilateral-to-mutual authentication compiler for key exchange (with applications to client authentication in tls 1. 3), " in ACM SIGSAC Conference on Computer and Communications Security (CCS), 2016, pp. 1438-1450.
    • (2016) ACM SIGSAC Conference on Computer and Communications Security (CCS) , pp. 1438-1450
    • Krawczyk, H.1
  • 51
    • 84884484198 scopus 로고    scopus 로고
    • On the security of the TLS protocol: A systematic analysis
    • H. Krawczyk, K. G. Paterson, and H. Wee, "On the security of the TLS protocol: A systematic analysis, " in CRYPTO 2013, 2013, pp. 429-448.
    • (2013) CRYPTO 2013 , pp. 429-448
    • Krawczyk, H.1    Paterson, K.G.2    Wee, H.3
  • 54
    • 84985960633 scopus 로고    scopus 로고
    • Elliptic curves for security
    • Jan.
    • A. Langley, M. Hamburg, and S. Turner, "Elliptic curves for security, " IRTF RFC 7748 https://tools. ietf. org/html/rfc7748, Jan. 2016.
    • (2016) IRTF RFC 7748
    • Langley, A.1    Hamburg, M.2    Turner, S.3
  • 59
  • 61
  • 62
    • 82955189836 scopus 로고    scopus 로고
    • Tag size does matter: Attacks and proofs for the TLS record protocol
    • K. G. Paterson, T. Ristenpart, and T. Shrimpton, "Tag size does matter: Attacks and proofs for the TLS record protocol, " in ASIACRYPT, 2011, pp. 372-389.
    • (2011) ASIACRYPT , pp. 372-389
    • Paterson, K.G.1    Ristenpart, T.2    Shrimpton, T.3
  • 66
    • 85024485833 scopus 로고    scopus 로고
    • Mar.
    • E. Rescorla, "0-RTT and Anti-Replay, " https://www. ietf. org/ mail-archive/web/tls/current/msg15594. html, Mar. 2015.
    • (2015) 0-RTT and Anti-Replay
    • Rescorla, E.1
  • 71
    • 84999935989 scopus 로고    scopus 로고
    • All your biases belong to us: Breaking RC4 in WPA-TKIP and TLS
    • M. Vanhoef and F. Piessens, "All your biases belong to us: Breaking RC4 in WPA-TKIP and TLS, " in USENIX Security Symposium, 2015, pp. 97-112.
    • (2015) USENIX Security Symposium , pp. 97-112
    • Vanhoef, M.1    Piessens, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.