Authenticated confidential channel establishment and the security of TLS-DHE
From MaRDI portal
Publication:1698403
DOI10.1007/S00145-016-9248-2zbMATH Open1386.94095OpenAlexW2571675338MaRDI QIDQ1698403FDOQ1698403
Authors: Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Publication date: 15 February 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-016-9248-2
Recommendations
Cites Work
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Key agreement protocols and their security analysis
- Authenticated key exchange secure against dictionary attacks
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Computer-Aided Security Proofs for the Working Cryptographer
- Title not available (Why is that?)
- New attacks on PKCS\#1 V1.5 encryption
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Modular Security Analysis of the TLS Handshake Protocol
- Protocols for authentification and key establishment
- Stronger Security of Authenticated Key Exchange
- Title not available (Why is that?)
- On the security of public key protocols
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model
- The TLS handshake protocol: A modular analysis
- A cryptographic analysis of the TLS 1.3 handshake protocol
- Title not available (Why is that?)
- On the security of TLS-DHE in the standard model
- On the security of the TLS protocol: a systematic analysis
- Proving the TLS handshake secure (as it is)
- Title not available (Why is that?)
- Breaking and provably repairing the SSH authenticated encryption scheme
- Applied cryptography and network security. 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2--5, 2009. Proceedings
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- (De-)constructing TLS 1.3
- The multi-user security of authenticated encryption: AES-GCM in TLS 1.3
- Instantiability of RSA-OAEP under chosen-plaintext attack
- The Security of DSA and ECDSA
- Lucky microseconds: a timing attack on Amazon's s2n implementation of TLS
- Safely exporting keys from secure channels. On the security of EAP-TLS and TLS key exporters
- Tag size does matter: attacks and proofs for the TLS record protocol
- Augmented secure channels and the goal of the TLS 1.3 record layer
- Title not available (Why is that?)
- Title not available (Why is that?)
- Practical invalid curve attacks on TLS-ECDH
- Hash function combiners in TLS and SSL
- On the security of the pre-shared key ciphersuites of TLS
- Universally Composable Security Analysis of TLS
Cited In (11)
- Signed Diffie-Hellman key exchange with tight security
- Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC
- Key-schedule security for the TLS 1.3 standard
- Secure channels and termination: the last word on TLS
- On the security of TLS-DHE in the standard model
- On the security of the TLS protocol: a systematic analysis
- Password-authenticated TLS via OPAQUE and post-handshake authentication
- Signed (group) Diffie-Hellman key exchange with tight security
- On the security of the pre-shared key ciphersuites of TLS
- Flexible authenticated and confidential channel establishment (fACCE): analyzing the noise protocol framework
- Modelling ciphersuite and version negotiation in the TLS protocol
Uses Software
This page was built for publication: Authenticated confidential channel establishment and the security of TLS-DHE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1698403)