Authenticated confidential channel establishment and the security of TLS-DHE
From MaRDI portal
Publication:1698403
Recommendations
Cites work
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- scientific article; zbMATH DE number 1617924 (Why is no real title available?)
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 1302834 (Why is no real title available?)
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 1942417 (Why is no real title available?)
- scientific article; zbMATH DE number 1942418 (Why is no real title available?)
- scientific article; zbMATH DE number 1842499 (Why is no real title available?)
- (De-)constructing TLS 1.3
- A Modular Security Analysis of the TLS Handshake Protocol
- A cryptographic analysis of the TLS 1.3 handshake protocol
- Applied cryptography and network security. 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2--5, 2009. Proceedings
- Augmented secure channels and the goal of the TLS 1.3 record layer
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Authenticated key exchange secure against dictionary attacks
- Breaking and provably repairing the SSH authenticated encryption scheme
- Computer-Aided Security Proofs for the Working Cryptographer
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Hash function combiners in TLS and SSL
- Instantiability of RSA-OAEP under chosen-plaintext attack
- Key agreement protocols and their security analysis
- Lucky microseconds: a timing attack on Amazon's s2n implementation of TLS
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- New attacks on PKCS\#1 V1.5 encryption
- On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model
- On the security of TLS-DHE in the standard model
- On the security of public key protocols
- On the security of the TLS protocol: a systematic analysis
- On the security of the pre-shared key ciphersuites of TLS
- Practical invalid curve attacks on TLS-ECDH
- Protocols for authentification and key establishment
- Proving the TLS handshake secure (as it is)
- Safely exporting keys from secure channels. On the security of EAP-TLS and TLS key exporters
- Stronger Security of Authenticated Key Exchange
- Tag size does matter: attacks and proofs for the TLS record protocol
- The Security of DSA and ECDSA
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- The TLS handshake protocol: A modular analysis
- The multi-user security of authenticated encryption: AES-GCM in TLS 1.3
- Universally Composable Security Analysis of TLS
Cited in
(11)- Secure channels and termination: the last word on TLS
- On the security of the pre-shared key ciphersuites of TLS
- Signed Diffie-Hellman key exchange with tight security
- Modelling ciphersuite and version negotiation in the TLS protocol
- Password-authenticated TLS via OPAQUE and post-handshake authentication
- On the security of the TLS protocol: a systematic analysis
- Signed (group) Diffie-Hellman key exchange with tight security
- On the security of TLS-DHE in the standard model
- Key-schedule security for the TLS 1.3 standard
- Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC
- Flexible authenticated and confidential channel establishment (fACCE): analyzing the noise protocol framework
This page was built for publication: Authenticated confidential channel establishment and the security of TLS-DHE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1698403)