Name
Papers
Collaborators
DOUGLAS STEBILA
83
118
Citations 
PageRank 
Referers 
578
48.66
1197
Referees 
References 
1126
922
Search Limit
1001000
Title
Citations
PageRank
Year
Proof-of-Possession for KEM Certificates using Verifiable Generation00.342022
Proof-of-possession for KEM certificates using verifiable generation.00.342022
A tale of two models: formal verification of KEMTLS via Tamarin.00.342022
Improving Software Quality in Cryptography Standardization Projects.00.342022
Post-quantum Key-Blinding for Authentication in Anonymity Networks.00.342021
SoK - Game-Based Security Models for Group Key Exchange.00.342021
Challenges in Cryptography00.342021
Improved Attacks Against Key Reuse in Learning with Errors Key Exchange.00.342021
End-to-End Security: When Do We Have It?00.342021
More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys00.342021
A Cryptographic Analysis Of The Tls 1.3 Handshake Protocol00.342021
The Advanced Encryption Standard: 20 Years Later10.362021
Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers00.342020
Towards Post-Quantum Security for Signal's X3DH Handshake00.342020
A Formal Security Analysis of the Signal Messaging Protocol30.502020
Efficient Oblivious Database Joins00.342020
Efficient Oblivious Database Joins.00.342020
ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work00.342020
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.00.342019
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH.00.342019
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos.00.342019
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.00.342018
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures.40.432017
Security Analysis of a Design Variant of Randomized Hashing.00.342017
Transitioning to a Quantum-Resistant Public Key Infrastructure.00.342017
A Formal Security Analysis of the Signal Messaging Protocol230.892017
From Identification to Signatures, Tightly: A Framework and Generic Transforms.110.572016
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.60.452016
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project.00.342016
Predicting TLS performance from key exchange performance: short paper.00.342016
Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters.20.392016
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE.501.462016
Authenticated Network Time Synchronization10.362016
Modelling Ciphersuite And Version Negotiation In The Tls Protocol10.362015
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange.40.392015
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.40.482015
An Analysis of TLS Handshake Proxying00.342015
Hierarchical deterministic Bitcoin wallets that tolerate key leakage.80.542015
An Analysis of TLS Handshake Proxying60.532015
Double-Authentication-Preventing Signatures from Trapdoor Identification.00.342015
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.290.932015
Continuous After-the-fact Leakage-Resilient Key Exchange (full version).00.342014
Plaintext awareness in identity-based key encapsulation10.352014
Secure modular password authentication for the web using channel bindings.10.432014
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem.662.242014
Protecting Encrypted Cookies from Compression Side-Channel Attacks.20.362014
Modelling after-the-fact leakage for key exchange210.772014
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol30.422014
Double-authentication-preventing signatures.10.362014
Formalising human recognition: a fundamental building block for security proofs20.372014
  • 1
  • 2