Proof-of-Possession for KEM Certificates using Verifiable Generation | 0 | 0.34 | 2022 |
Proof-of-possession for KEM certificates using verifiable generation. | 0 | 0.34 | 2022 |
A tale of two models: formal verification of KEMTLS via Tamarin. | 0 | 0.34 | 2022 |
Improving Software Quality in Cryptography Standardization Projects. | 0 | 0.34 | 2022 |
Post-quantum Key-Blinding for Authentication in Anonymity Networks. | 0 | 0.34 | 2021 |
SoK - Game-Based Security Models for Group Key Exchange. | 0 | 0.34 | 2021 |
Challenges in Cryptography | 0 | 0.34 | 2021 |
Improved Attacks Against Key Reuse in Learning with Errors Key Exchange. | 0 | 0.34 | 2021 |
End-to-End Security: When Do We Have It? | 0 | 0.34 | 2021 |
More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys | 0 | 0.34 | 2021 |
A Cryptographic Analysis Of The Tls 1.3 Handshake Protocol | 0 | 0.34 | 2021 |
The Advanced Encryption Standard: 20 Years Later | 1 | 0.36 | 2021 |
Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers | 0 | 0.34 | 2020 |
Towards Post-Quantum Security for Signal's X3DH Handshake | 0 | 0.34 | 2020 |
A Formal Security Analysis of the Signal Messaging Protocol | 3 | 0.50 | 2020 |
Efficient Oblivious Database Joins | 0 | 0.34 | 2020 |
Efficient Oblivious Database Joins. | 0 | 0.34 | 2020 |
ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work | 0 | 0.34 | 2020 |
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms. | 0 | 0.34 | 2019 |
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. | 0 | 0.34 | 2019 |
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos. | 0 | 0.34 | 2019 |
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. | 0 | 0.34 | 2018 |
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. | 4 | 0.43 | 2017 |
Security Analysis of a Design Variant of Randomized Hashing. | 0 | 0.34 | 2017 |
Transitioning to a Quantum-Resistant Public Key Infrastructure. | 0 | 0.34 | 2017 |
A Formal Security Analysis of the Signal Messaging Protocol | 23 | 0.89 | 2017 |
From Identification to Signatures, Tightly: A Framework and Generic Transforms. | 11 | 0.57 | 2016 |
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol. | 6 | 0.45 | 2016 |
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project. | 0 | 0.34 | 2016 |
Predicting TLS performance from key exchange performance: short paper. | 0 | 0.34 | 2016 |
Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters. | 2 | 0.39 | 2016 |
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE. | 50 | 1.46 | 2016 |
Authenticated Network Time Synchronization | 1 | 0.36 | 2016 |
Modelling Ciphersuite And Version Negotiation In The Tls Protocol | 1 | 0.36 | 2015 |
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. | 4 | 0.39 | 2015 |
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. | 4 | 0.48 | 2015 |
An Analysis of TLS Handshake Proxying | 0 | 0.34 | 2015 |
Hierarchical deterministic Bitcoin wallets that tolerate key leakage. | 8 | 0.54 | 2015 |
An Analysis of TLS Handshake Proxying | 6 | 0.53 | 2015 |
Double-Authentication-Preventing Signatures from Trapdoor Identification. | 0 | 0.34 | 2015 |
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. | 29 | 0.93 | 2015 |
Continuous After-the-fact Leakage-Resilient Key Exchange (full version). | 0 | 0.34 | 2014 |
Plaintext awareness in identity-based key encapsulation | 1 | 0.35 | 2014 |
Secure modular password authentication for the web using channel bindings. | 1 | 0.43 | 2014 |
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. | 66 | 2.24 | 2014 |
Protecting Encrypted Cookies from Compression Side-Channel Attacks. | 2 | 0.36 | 2014 |
Modelling after-the-fact leakage for key exchange | 21 | 0.77 | 2014 |
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol | 3 | 0.42 | 2014 |
Double-authentication-preventing signatures. | 1 | 0.36 | 2014 |
Formalising human recognition: a fundamental building block for security proofs | 2 | 0.37 | 2014 |