Breaking and provably repairing the SSH authenticated encryption scheme
From MaRDI portal
Publication:3546458
DOI10.1145/996943.996945zbMath1291.94056OpenAlexW2108855216WikidataQ122704969 ScholiaQ122704969MaRDI QIDQ3546458
Mihir Bellare, Chanathip Namprempre, Tadayoshi Kohno
Publication date: 21 December 2008
Published in: ACM Transactions on Information and System Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/996943.996945
Related Items (14)
Data Is a Stream: Security of Stream-Based Channels ⋮ On Symmetric Encryption with Distinguishable Decryption Failures ⋮ Jammin' on the deck ⋮ Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3 ⋮ New proofs for NMAC and HMAC: security without collision resistance ⋮ Authenticated confidential channel establishment and the security of TLS-DHE ⋮ Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment ⋮ Cryptography in Theory and Practice: The Case of Encryption in IPsec ⋮ Cryptanalysis of the EPBC Authenticated Encryption Mode ⋮ Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC ⋮ Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ Analysis of the SSH Key Exchange Protocol ⋮ The memory-tightness of authenticated encryption
This page was built for publication: Breaking and provably repairing the SSH authenticated encryption scheme