On the Security of the TLS Protocol: A Systematic Analysis

From MaRDI portal
Publication:2845687

DOI10.1007/978-3-642-40041-4_24zbMath1310.94158OpenAlexW2153041122MaRDI QIDQ2845687

Hugo Krawczyk, Hoeteck Wee, Kenneth G. Paterson

Publication date: 2 September 2013

Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_24




Related Items (25)

Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol FrameworkBenchmarking Post-quantum Cryptography in TLSTowards post-quantum security for signal's X3DH handshakePractical isogeny-based key-exchange with optimal tightnessShort variable length domain extenders with beyond birthday bound securityData Is a Stream: Security of Stream-Based ChannelsAn efficient post-quantum KEM from CSIDHModelling Ciphersuite and Version Negotiation in the TLS ProtocolZero round-trip time for the extended access control protocolOn the concrete security of TLS 1.3 PSK modeOn optimal tightness for key exchange with full forward secrecy via key confirmationPost-quantum anonymous one-sided authenticated key exchange without random oraclesAuthenticated confidential channel establishment and the security of TLS-DHECCA updatable encryption against malicious re-encryption attacksCCA-secure (puncturable) KEMs from encryption with non-negligible decryption errorsState separation for code-based game-playing proofsA cryptographic analysis of the TLS 1.3 handshake protocolA Modular Security Analysis of EAP and IEEE 802.11A characterization of amenable groups by Besicovitch pseudodistancesSession resumption protocols and efficient forward security for TLS 1.3 0-RTTSecure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUICOn the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deploymentsIdentity-based authenticated encryption with identity confidentialityUnilaterally-Authenticated Key Exchange0-RTT Key Exchange with Full Forward Secrecy







This page was built for publication: On the Security of the TLS Protocol: A Systematic Analysis