The Design and Implementation of Datagram TLS (2004)


Download Links

by Nagendra Modadugu , Eric Rescorla
Citations:23 - 1 self

Active Bibliography

Copyright C – Ieee See, Michael B. Greenwald, Sandeep K. Singhal, Jonathan R. Stone, David R. Cheriton - 1996
Smart Card Based Configuration and . . . – Antti Järvinen - 2003
5 A New authentication Mechanism and Key Agreement Protocol for SIP Using Identity-based Cryptography – Jared Ring, Kim-kwang Raymond, Choo Ernest Foo, Mark Looi - 2006
Scalable Multimedia Communication with – Internet Multicast Light-Weight, Internet Multicast, Light-weight Sessions, The Mbone
25 Scalable Multimedia Communication with Internet Multicast, Light-weight Sessions, and the MBone – Steven McCanne
Modes of Operation of a Block Cipher – B. Preneel
3 Padding oracle attacks on the ISO CBC mode encryption standard,” Topics – Kenneth G. Paterson, Arnold Yau - 2004
9 Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol – Kenneth G. Paterson, Thomas Ristenpart, Thomas Shrimpton
10 Deconstructing New Cache Designs for Thwarting Software Cache-based Side Channel Attacks – Jingfei Kong, Onur Acıiçmez, Huiyang Zhou
8 Determinating Timing Channels in Compute Clouds – Amittai Aviram, Sen Hu, Bryan Ford, Ramakrishna Gummadi
2013 IEEE Symposium on Security and Privacy SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements – Jeremy Clark, Paul C. Van Oorschot
15 The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks – David Molnar, Matt Piotrowski, David Schultz, David Wagner - 2005
Status of this Memo The Transport Layer Security (TLS) Protocol – Internet-draft Tim Dierks - 2008
2 Client Side Caching for TLS – Hovav Shacham, Dan Boneh, Eric Rescorla - 2002
Chair for Network and Data Security – Christopher Meyer, Jörg Schwenk
4 The transport layer security (TLS) protocol – T. Dierks, E. Rescorla - 2006
3 Client-side caching for TLS – Hovav Shacham, Dan Boneh, Eric Rescorla - 2004
22 Plaintext recovery attacks against SSH – Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson - 2009
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks – Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger