A Surfeit of SSH Cipher Suites
暂无分享,去创建一个
Kenneth G. Paterson | Martin R. Albrecht | Jean Paul Degabriele | Torben Brandt Hansen | K. Paterson
[1] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .
[2] Thomas Shrimpton,et al. Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem , 2006, IACR Cryptol. ePrint Arch..
[3] Chanathip Namprempre,et al. Reconsidering Generic Composition , 2014, IACR Cryptol. ePrint Arch..
[4] Phillip Rogaway,et al. Nonce-Based Symmetric Encryption , 2004, FSE.
[5] Daniel J. Bernstein,et al. The Poly1305-AES Message-Authentication Code , 2005, FSE.
[6] Kenneth G. Paterson,et al. Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR , 2010, IACR Cryptol. ePrint Arch..
[7] Adam Langley,et al. ChaCha20 and Poly1305 for IETF Protocols , 2018, RFC.
[8] Simon Josefsson,et al. The chacha20-poly1305@openssh.com authenticated encryption cipher , 2015 .
[9] Unrecognized. The use of UMAC in the SSH Transport Layer Protocol , 2007 .
[10] Chanathip Namprempre,et al. The Secure Shell (SSH) Transport Layer Encryption Modes , 2006, RFC.
[11] Eric Wustrow,et al. ZMap: Fast Internet-wide Scanning and Its Security Applications , 2013, USENIX Security Symposium.
[12] Kenneth G. Paterson,et al. Plaintext Recovery Attacks against SSH , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[13] Adam Langley,et al. ChaCha20 and Poly1305 for IETF Protocols , 2018, RFC.
[14] Chanathip Namprempre,et al. Authenticated encryption in SSH: provably fixing the SSH binary packet protocol , 2002, CCS '02.
[15] Chanathip Namprempre,et al. Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm , 2004, TSEC.
[16] Kenneth G. Paterson,et al. On Symmetric Encryption with Distinguishable Decryption Failures , 2013, FSE.
[17] Jerome A. Solinas,et al. AES Galois Counter Mode for the Secure Shell Transport Layer Protocol , 2009, RFC.
[18] Tatu Ylönen,et al. The Secure Shell (ssh) Transport Layer Protocol , 2006 .
[19] D. McGrew,et al. The Galois/Counter Mode of Operation (GCM) , 2005 .
[20] John Viega,et al. The Security and Performance of the Galois/Counter Mode (GCM) of Operation , 2004, INDOCRYPT.
[21] Denis Bider,et al. SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol , 2012, RFC.
[22] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, Journal of Cryptology.
[23] Kenneth G. Paterson,et al. Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation , 2012, IACR Cryptol. ePrint Arch..
[24] Kenneth G. Paterson,et al. Lucky Thirteen: Breaking the TLS and DTLS Record Protocols , 2013, 2013 IEEE Symposium on Security and Privacy.