Ratcheted Encryption and Key Exchange: The Security of Messaging
暂无分享,去创建一个
Mihir Bellare | Igors Stepanovs | Joseph Jaeger | Asha Camper Singh | Maya Nyayapati | M. Bellare | Joseph Jaeger | Igors Stepanovs | Asha Camper Singh | Maya Nyayapati
[1] Shouhuai Xu,et al. Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.
[2] Nikita Borisov,et al. Off-the-record communication, or, why not to use PGP , 2004, WPES '04.
[3] Phillip Rogaway,et al. Authenticated-encryption with associated-data , 2002, CCS '02.
[4] Douglas Stebila,et al. A Formal Security Analysis of the Signal Messaging Protocol , 2017, Journal of Cryptology.
[5] Mihir Bellare,et al. The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 , 2016, CRYPTO.
[6] Mihir Bellare,et al. Forward-Security in Private-Key Cryptography , 2003, CT-RSA.
[7] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[8] Marc Fischlin,et al. Multi-Stage Key Exchange and the Case of Google's QUIC Protocol , 2014, CCS.
[9] Mihir Bellare,et al. Key Insulation and Intrusion Resilience over a Public Channel , 2009, CT-RSA.
[10] Phillip Rogaway,et al. Nonce-Based Symmetric Encryption , 2004, FSE.
[11] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.
[12] Shouhuai Xu,et al. Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software , 2012, ASIACCS '12.
[13] Cas J. F. Cremers,et al. On Post-compromise Security , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).
[14] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[15] David Pointcheval,et al. The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes , 2001, Public Key Cryptography.
[16] Mihir Bellare,et al. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES , 2001, CT-RSA.
[17] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[18] Ian Goldberg,et al. SoK: Secure Messaging , 2015, 2015 IEEE Symposium on Security and Privacy.
[19] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.