The TLS handshake protocol: A modular analysis
From MaRDI portal
Publication:2267369
DOI10.1007/s00145-009-9052-3zbMath1181.94103OpenAlexW1967714718MaRDI QIDQ2267369
Bogdan Warinschi, Nigel P. Smart, P. Morrissey
Publication date: 1 March 2010
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: http://link.springer.com/article/10.1007%2Fs00145-009-9052-3
Related Items
Authenticated confidential channel establishment and the security of TLS-DHE ⋮ Virtualizing access to scientific applications with the application hosting environment ⋮ Доказательство защищенности протокола обмена ключами ⋮ Encryption modes with almost free message integrity ⋮ Analysis of the SSH Key Exchange Protocol
Cites Work
- Key agreement protocols and their security analysis
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- The Layered Games Framework for Specifications and Analysis of Security Protocols
- Modular Security Proofs for Key Agreement Protocols
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Universally Composable Security Analysis of TLS
- Public Key Cryptography - PKC 2005
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: The TLS handshake protocol: A modular analysis