A Modular Security Analysis of the TLS Handshake Protocol
From MaRDI portal
Publication:3600365
DOI10.1007/978-3-540-89255-7_5zbMath1206.94082OpenAlexW1531296821MaRDI QIDQ3600365
P. Morrissey, Bogdan Warinschi, Nigel P. Smart
Publication date: 10 February 2009
Published in: Advances in Cryptology - ASIACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_5
Related Items (10)
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework ⋮ A provable privacy-protection system for multi-server environment ⋮ Modelling Ciphersuite and Version Negotiation in the TLS Protocol ⋮ Post-quantum anonymous one-sided authenticated key exchange without random oracles ⋮ Anonymity and one-way authentication in key exchange protocols ⋮ Authenticated confidential channel establishment and the security of TLS-DHE ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ Ideal Key Derivation and Encryption in Simulation-Based Security ⋮ On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments ⋮ Universally Composable Security Analysis of TLS
Cites Work
- Key agreement protocols and their security analysis
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Advances in Cryptology - CRYPTO 2003
- Modular Security Proofs for Key Agreement Protocols
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Public Key Cryptography - PKC 2005
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: A Modular Security Analysis of the TLS Handshake Protocol