A cross-protocol attack on the TLS protocol
暂无分享,去创建一个
Frederik Vercauteren | Bart Preneel | Vesselin Velichkov | Nikos Mavrogiannopoulos | B. Preneel | F. Vercauteren | Nikos Mavrogiannopoulos | V. Velichkov
[1] H. W. Lenstra,et al. Factoring integers with elliptic curves , 1987 .
[2] Gregory V. Bard,et al. A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL , 2006, SECRYPT.
[3] Bodo Möller,et al. Network Working Group Elliptic Curve Cryptography (ecc) Cipher Suites for Transport Layer Security (tls) , 2006 .
[4] R Core Team,et al. R: A language and environment for statistical computing. , 2014 .
[5] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[6] Kazumaro Aoki,et al. SEC X.2: Recommended Elliptic Curve Domain Parameters , 2008 .
[7] Serge Vaudenay,et al. Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS , 2002, EUROCRYPT.
[8] Cas J. F. Cremers. Feasibility of multi-protocol attacks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[9] Bruce Schneier,et al. Analysis of the SSL 3.0 protocol , 1996 .
[10] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[11] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[12] Carl Pomerance,et al. The Development of the Number Field Sieve , 1994 .
[13] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[14] Hannes Tschofenig,et al. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS) , 2005, RFC.
[15] David Taylor,et al. Using the Secure Remote Password (SRP) Protocol for TLS Authentication , 2007, RFC.
[16] Anton Stiglic,et al. Security Issues in the Diffie-Hellman Key Agreement Protocol , 2001 .
[17] Vlastimil Klíma,et al. Attacking RSA-Based Sessions in SSL/TLS , 2003, CHES.
[18] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[19] K. Dickman. On the frequency of numbers containing prime factors of a certain relative magnitude , 1930 .
[20] Dj Daniel Bernstein,et al. A general number field sieve implementation , 1993 .
[21] Daniel Bleichenbacher,et al. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.
[22] Eric Rescorla,et al. Transport Layer Security (TLS) Renegotiation Indication Extension , 2010, RFC.
[23] Alan O. Freier,et al. Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .
[24] Ross J. Anderson,et al. Robustness Principles for Public Key Protocols , 1995, CRYPTO.
[25] Clemens Heinrich,et al. Transport Layer Security (TLS) , 2011, Encyclopedia of Cryptography and Security.