Douglas Stebila

From MaRDI portal
(Redirected from Person:832360)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Making an asymmetric PAKE quantum-annoying by hiding group elements2024-06-05Paper
Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation2024-04-26Paper
A reduction-based proof for authentication and session key security in three-party Kerberos
International Journal of Applied Cryptography
2023-09-15Paper
Post-quantum asynchronous deniable key exchange and the signal handshake
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Benchmarking post-quantum cryptography in TLS
Post-Quantum Cryptography
2022-10-13Paper
More efficient post-quantum KEMTLS with pre-distributed public keys2022-06-15Paper
Post-quantum key-blinding for authentication in anonymity networks2022-06-15Paper
Improved attacks against key reuse in learning with errors key exchange2022-06-15Paper
Towards post-quantum security for signal's X3DH handshake2022-03-25Paper
The ``Quantum annoying property of password-authenticated key exchange protocols2022-03-22Paper
A cryptographic analysis of the TLS 1.3 handshake protocol
Journal of Cryptology
2021-09-10Paper
A formal security analysis of the Signal messaging protocol
Journal of Cryptology
2020-11-06Paper
Hybrid key encapsulation mechanisms and authenticated key exchange2020-02-25Paper
Protocols for authentication and key establishment
Information Security and Cryptography
2019-10-10Paper
Transitioning to a quantum-resistant public key infrastructure2018-09-12Paper
Post-quantum key exchange for the Internet and the open quantum safe project2018-02-16Paper
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
Lecture Notes in Computer Science
2017-06-13Paper
From Identification to Signatures, Tightly: A Framework and Generic Transforms
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Safely exporting keys from secure channels. On the security of EAP-TLS and TLS key exporters
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Continuous after-the-fact leakage-resilient eCK-secure key exchange
Cryptography and Coding
2016-01-12Paper
Modelling ciphersuite and version negotiation in the TLS protocol
Information Security and Privacy
2015-10-20Paper
Hierarchical deterministic bitcoin wallets that tolerate key leakage
Financial Cryptography and Data Security
2015-09-29Paper
Double-authentication-preventing signatures
Computer Security - ESORICS 2014
2015-07-24Paper
ASICS: Authenticated key exchange security incorporating certification systems
Lecture Notes in Computer Science
2014-10-16Paper
Continuous After-the-Fact Leakage-Resilient Key Exchange
Information Security and Privacy
2014-07-24Paper
Quantum one-time programs. (Extended abstract)
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two
Information Security and Privacy
2013-06-28Paper
Quantum key distribution in the classical authenticated key exchange framework
Post-Quantum Cryptography
2013-06-14Paper
Quantum key distribution in the classical authenticated key exchange framework
Post-Quantum Cryptography
2013-06-14Paper
Anonymity and one-way authentication in key exchange protocols
Designs, Codes and Cryptography
2013-04-03Paper
Efficient modular exponentiation-based puzzles for denial-of-service protection
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Publicly verifiable ciphertexts
Lecture Notes in Computer Science
2012-09-25Paper
Effort-release public-key encryption from cryptographic puzzles
Information Security and Privacy
2012-09-07Paper
Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy
Lecture Notes in Computer Science
2011-12-16Paper
scientific article; zbMATH DE number 5901453 (Why is no real title available?)
(available as arXiv preprint)
2011-05-31Paper
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
The case for quantum key distribution
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
2010-12-21Paper
The case for quantum key distribution
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
2010-12-21Paper
Fixed argument pairings
Lecture Notes in Computer Science
2010-08-31Paper
Towards Denial-of-Service-Resilient Key Agreement Protocols
Information Security and Privacy
2009-06-25Paper
scientific article; zbMATH DE number 2043312 (Why is no real title available?)2004-02-16Paper
An End-to-End Systems Approach to Elliptic Curve Cryptography2003-09-11Paper


Research outcomes over time


This page was built for person: Douglas Stebila