A Cryptographic Analysis of the WireGuard Protocol
暂无分享,去创建一个
[1] Bogdan Warinschi,et al. A Modular Security Analysis of the TLS Handshake Protocol , 2008, ASIACRYPT.
[2] Douglas Stebila,et al. Modelling Ciphersuite and Version Negotiation in the TLS Protocol , 2015, ACISP.
[3] Phillip Rogaway,et al. Authenticated-encryption with associated-data , 2002, CCS '02.
[4] Daniel J. Bernstein,et al. Curve25519: New Diffie-Hellman Speed Records , 2006, Public Key Cryptography.
[5] Alfredo Pironti,et al. A Messy State of the Union: Taming the Composite State Machines of TLS , 2015, 2015 IEEE Symposium on Security and Privacy.
[6] Marc Fischlin,et al. Zero Round-Trip Time for the Extended Access Control Protocol , 2017, ESORICS.
[7] Adam Langley,et al. ChaCha20 and Poly1305 for IETF Protocols , 2018, RFC.
[8] Kenneth G. Paterson,et al. On the Security of the TLS Protocol: A Systematic Analysis , 2013, IACR Cryptol. ePrint Arch..
[9] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[10] Marc Fischlin,et al. PRF-ODH: Relations, Instantiations, and Impossibility Results , 2017, CRYPTO.
[11] Jason A. Donenfeld. WireGuard: Next Generation Kernel Network Tunnel , 2017, NDSS.
[12] Kenneth G. Paterson,et al. One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography , 2013, NDSS.
[13] Marc Fischlin,et al. Composability of bellare-rogaway key exchange protocols , 2011, CCS '11.
[14] Tibor Jager,et al. On the Security of TLS-DHE in the Standard Model , 2012, CRYPTO.
[15] Marc Fischlin,et al. A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol , 2016, IACR Cryptol. ePrint Arch..
[16] Matthew Green,et al. Downgrade Resilience in Key-Exchange Protocols , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[17] Alfredo Pironti,et al. Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS , 2014, 2014 IEEE Symposium on Security and Privacy.
[18] Willi Meier,et al. The Hash Function BLAKE , 2015, Information Security and Cryptography.
[19] Matthew Green,et al. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice , 2015, CCS.
[20] Marc Fischlin,et al. A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates , 2015, IACR Cryptol. ePrint Arch..
[21] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[22] Cas J. F. Cremers,et al. Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal , 2012, ESORICS.