A formal security analysis of the signal messaging protocol K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila Journal of Cryptology 33 (4), 1914-1983, 2020 | 215 | 2020 |
A cryptographic analysis of the TLS 1.3 handshake protocol candidates B Dowling, M Fischlin, F Günther, D Stebila Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 108 | 2015 |
Secure logging schemes and certificate transparency B Dowling, F Günther, U Herath, D Stebila European Symposium on Research in Computer Security, 140-158, 2016 | 44 | 2016 |
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol. B Dowling, M Fischlin, F Günther, D Stebila IACR Cryptol. ePrint Arch. 2016, 81, 2016 | 38 | 2016 |
Multi-ciphersuite security of the Secure Shell (SSH) protocol F Bergsma, B Dowling, F Kohlar, J Schwenk, D Stebila Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 37 | 2014 |
Authenticated network time synchronization B Dowling, D Stebila, G Zaverucha 25th {USENIX} Security Symposium ({USENIX} Security 16), 823-840, 2016 | 31 | 2016 |
A cryptographic analysis of the WireGuard protocol B Dowling, KG Paterson International Conference on Applied Cryptography and Network Security, 3-21, 2018 | 25 | 2018 |
Modelling ciphersuite and version negotiation in the TLS protocol B Dowling, D Stebila Australasian Conference on Information Security and Privacy, 270-288, 2015 | 15 | 2015 |
Identity confidentiality in 5G mobile telephony systems H Khan, B Dowling, KM Martin International Conference on Research in Security Standardisation, 120-142, 2018 | 13 | 2018 |
Provable security of internet protocols BJ Dowling Queensland University of Technology, 2017 | 8 | 2017 |
Highly efficient privacy-preserving key agreement for wireless body area Networks H Khan, B Dowling, KM Martin 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 7 | 2018 |
A cryptographic analysis of the TLS 1.3 handshake protocol B Dowling, M Fischlin, F Günther, D Stebila Journal of Cryptology, 2020 | 6 | 2020 |
Flexible authenticated and confidential channel establishment (fACCE): Analyzing the Noise protocol framework B Dowling, P Rösler, J Schwenk IACR International Conference on Public-Key Cryptography, 341-373, 2020 | 4 | 2020 |
Multi-ciphersuite security and the SSH protocol. B Dowling, F Giesen, F Kohlar, J Schwenk, D Stebila IACR Cryptol. ePrint Arch. 2013, 813, 2013 | 4 | 2013 |
There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging. B Dowling, B Hale IACR Cryptol. ePrint Arch. 2020, 541, 2020 | 3 | 2020 |
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange B Dowling, TB Hansen, KG Paterson International Conference on Post-Quantum Cryptography, 483-502, 2020 | 2 | 2020 |
A formal analysis of the signal messaging protocol K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila IEEE, 2017 | 2 | 2017 |
ANTP: Authenticated NTP Implementation Specification B Dowling, D Stebila, G Zaverucha Microsoft Research Technical Report, MSR-TR-2015-19, 2015. http://research …, 0 | 1 | |
Pragmatic Authenticated Key Agreement for IEEE Std 802.15. 6. H Khan, B Dowling, KM Martin IACR Cryptol. ePrint Arch. 2020, 45, 2020 | | 2020 |
PC Members ARM Abdou, A Sabelfeld, A Luykx, A Rashid, B Mennink, B Stock, ... | | |