Authenticated confidential channel establishment and the security of TLS-DHE
From MaRDI portal
Publication:1698403
DOI10.1007/s00145-016-9248-2zbMath1386.94095OpenAlexW2571675338MaRDI QIDQ1698403
Sven Schäge, Florian Kohlar, Tibor Jager, Jorg Schwenk
Publication date: 15 February 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-016-9248-2
Related Items (4)
Signed Diffie-Hellman key exchange with tight security ⋮ Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework ⋮ Key-schedule security for the TLS 1.3 standard ⋮ Signed (group) Diffie-Hellman key exchange with tight security
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Applied cryptography and network security. 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2--5, 2009. Proceedings
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Protocols for authentification and key establishment
- A cryptographic analysis of the TLS 1.3 handshake protocol
- The TLS handshake protocol: A modular analysis
- Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS
- Safely Exporting Keys from Secure Channels
- The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3
- On the Security of the TLS Protocol: A Systematic Analysis
- Proving the TLS Handshake Secure (As It Is)
- On the Security of TLS-DHE in the Standard Model
- Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
- (De-)Constructing TLS 1.3
- Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
- Stronger Security of Authenticated Key Exchange
- Breaking and provably repairing the SSH authenticated encryption scheme
- Instantiability of RSA-OAEP under Chosen-Plaintext Attack
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- A Modular Security Analysis of the TLS Handshake Protocol
- On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model
- On the security of public key protocols
- Key agreement protocols and their security analysis
- The Security of DSA and ECDSA
- Practical Invalid Curve Attacks on TLS-ECDH
- Hash Function Combiners in TLS and SSL
- Computer-Aided Security Proofs for the Working Cryptographer
- On the Security of the Pre-shared Key Ciphersuites of TLS
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Universally Composable Security Analysis of TLS
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
This page was built for publication: Authenticated confidential channel establishment and the security of TLS-DHE