Analysis of the SSH Key Exchange Protocol
From MaRDI portal
Publication:3104707
DOI10.1007/978-3-642-25516-8_22zbMath1291.94168MaRDI QIDQ3104707
Publication date: 16 December 2011
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25516-8_22
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The TLS handshake protocol: A modular analysis
- Breaking and provably repairing the SSH authenticated encryption scheme
- Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
- Key agreement protocols and their security analysis
- Modular Security Proofs for Key Agreement Protocols
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Public Key Cryptography - PKC 2005