Author:
Dowling Benjamin,Rösler Paul,Schwenk Jörg
Publisher
Springer International Publishing
Reference33 articles.
1. Aviram, N., et al.: DROWN: breaking TLS using SSLv2. In: USENIX Security (2016)
2. Lecture Notes in Computer Science;M Bellare,1994
3. Bergsma, F., Dowling, B., Kohlar, F., Schwenk, J., Stebila, D.: Multi-ciphersuite security of the secure shell (SSH) protocol. In: CCS 2014 (2014)
4. Blazy, O., Bossuat, A., Bultel, X., Fouque, P.-A., Onete, C., Pagnin, E.: SAID: reshaping signal into an identity-based asynchronous messaging protocol with authenticated ratcheting. In: IEEE EuroS&P 2019 (2019)
5. Lecture Notes in Computer Science;J Brendel,2017
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV;Topics in Cryptology – CT-RSA 2023;2023
2. Post Quantum Noise;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07
3. Noise: A Library of Verified High-Performance Secure Channel Protocol Implementations;2022 IEEE Symposium on Security and Privacy (SP);2022-05
4. Strongly Anonymous Ratcheted Key Exchange;Advances in Cryptology – ASIACRYPT 2022;2022
5. IP Security (IPsec);Guide to Internet Cryptography;2022