Douglas Stebila
Douglas Stebila
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
Protocols for authentication and key establishment, Second Edition
C Boyd, A Mathuria, D Stebila
Springer, 2019
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
JW Bos, C Costello, M Naehrig, D Stebila
IEEE Symposium on Security & Privacy (S&P) 2015, 553-570, 2015
Frodo: Take off the ring! Practical, quantum-secure key exchange from LWE
J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Performance analysis of elliptic curve cryptography for SSL
V Gupta, S Gupta, S Chang, D Stebila
Proceedings of the 1st ACM workshop on Wireless security, 87-94, 2002
A Formal Security Analysis of the Signal Messaging Protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
An end-to-end systems approach to elliptic curve cryptography
N Gura, SC Shantz, H Eberle, S Gupta, V Gupta, D Finchelstein, E Goupy, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 349-365, 2002
Multi-factor password-authenticated key exchange
DJ Stebila, PV Udupi, SC Shantz
US Patent 8,776,176, 2014
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
B Dowling, M Fischlin, F Günther, D Stebila
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Speeding up secure Web transactions using elliptic curve cryptography
V Gupta, D Stebila, S Fung, SC Shantz, N Gura, H Eberle
11th Annual Network and Distributed System Security Symposium (NDSS 2004), 2004
Anonymity and one-way authentication in key exchange protocols
I Goldberg, D Stebila, B Ustaoglu
Designs, Codes and Cryptography 67 (2), 245-269, 2013
Post-quantum key exchange for the internet and the open quantum safe project
D Stebila, M Mosca
International Conference on Selected Areas in Cryptography, 14-37, 2016
On the security of TLS renegotiation
F Giesen, F Kohlar, D Stebila
Proceedings of the 2013 ACM Conference on Computer & Communications Security …, 2013
Quantum one-time programs
A Broadbent, G Gutoski, D Stebila
Advances in Cryptology–CRYPTO 2013, 344-360, 2013
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
D Stebila, L Kuppusamy, J Rangasamy, C Boyd, J Gonzalez Nieto
Topics in Cryptology–CT-RSA 2011, 284-301, 2011
One-time-password-authenticated key exchange (full version)
KG Paterson, D Stebila
Australasian Conference on Information Security and Privacy (ACISP), 2010
Modelling after-the-fact leakage for key exchange
J Alawatugoda, D Stebila, C Boyd
Proceedings of the 9th ACM Symposium on Information, Computer and …, 2014
Quantum coins
M Mosca, D Stebila
Error-Correcting Codes, Finite Geometries and Cryptography 523, 35-47, 2010
Secure logging schemes and Certificate Transparency
B Dowling, F Günther, U Herath, D Stebila
European Symposium on Research in Computer Security, 140-158, 2016
Elliptic curve algorithm integration in the Secure Shell transport layer
D Stebila, J Green
Unified point addition formulæ and side-channel attacks
D Stebila, N Thériault
International Workshop on Cryptographic Hardware and Embedded Systems, 354-368, 2006
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20