On the Security of the TLS Protocol: A Systematic Analysis
From MaRDI portal
Publication:2845687
DOI10.1007/978-3-642-40041-4_24zbMath1310.94158OpenAlexW2153041122MaRDI QIDQ2845687
Hugo Krawczyk, Hoeteck Wee, Kenneth G. Paterson
Publication date: 2 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_24
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Network protocols (68M12) Internet topics (68M11)
Related Items (25)
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework ⋮ Benchmarking Post-quantum Cryptography in TLS ⋮ Towards post-quantum security for signal's X3DH handshake ⋮ Practical isogeny-based key-exchange with optimal tightness ⋮ Short variable length domain extenders with beyond birthday bound security ⋮ Data Is a Stream: Security of Stream-Based Channels ⋮ An efficient post-quantum KEM from CSIDH ⋮ Modelling Ciphersuite and Version Negotiation in the TLS Protocol ⋮ Zero round-trip time for the extended access control protocol ⋮ On the concrete security of TLS 1.3 PSK mode ⋮ On optimal tightness for key exchange with full forward secrecy via key confirmation ⋮ Post-quantum anonymous one-sided authenticated key exchange without random oracles ⋮ Authenticated confidential channel establishment and the security of TLS-DHE ⋮ CCA updatable encryption against malicious re-encryption attacks ⋮ CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors ⋮ State separation for code-based game-playing proofs ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ A Modular Security Analysis of EAP and IEEE 802.11 ⋮ A characterization of amenable groups by Besicovitch pseudodistances ⋮ Session resumption protocols and efficient forward security for TLS 1.3 0-RTT ⋮ Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC ⋮ On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments ⋮ Identity-based authenticated encryption with identity confidentiality ⋮ Unilaterally-Authenticated Key Exchange ⋮ 0-RTT Key Exchange with Full Forward Secrecy
This page was built for publication: On the Security of the TLS Protocol: A Systematic Analysis