Provably Fixing the SSH Binary Packet Protocol (2002)

Cached

Download Links

by Mihir Bellare , Tadayoshi Kohno , Chanathip Namprempre
Citations:6 - 1 self

Active Bibliography

22 Authenticated encryption in SSH: Provably fixing the SSH Binary Packet Protocol. Cryptology ePrint Archive, Report 2002/078 – Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre - 2002
19 Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm – Mihir Bellare - 2004
222 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
138 On the security of joint signature and encryption – Jee Hea An, Yevgeniy Dodis, Tal Rabin - 2002
The Associated-Data Problem (How to cheaply authenticate unencrypted data when using an authenticated-encryption scheme) – Phillip Rogaway - 2001
1 Proposal to NIST for a block-cipher mode of operation which simultaneously provides privacy and authenticity – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
3 Proposal to NIST for a parallelizable message authentication code – Phillip Rogaway, John Black - 2001
136 OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
33 Authenticated-encryption with associated-data – Phillip Rogaway - 2002
16 Does Encryption with Redundancy Provide Authenticity? – Jee Hea An, Mihir Bellare - 2001
2 A Critique of CCM – P. Rogaway, D. Wagner - 2003
321 Tinysec: A link layer security architecture for wireless sensor networks – Chris Karlof, Naveen Sastry, David Wagner
10 Concealment and its applications to authenticated encryption – Yevgeniy Dodis, Jee Hea An - 2003
25 A provable-security treatment of the key-wrap problem – Phillip Rogaway, Thomas Shrimpton - 2006
7 On the Role of Definitions in and Beyond Cryptography – Phillip Rogaway - 2004
A Cryptographic Tour of the IPsec Standards – Kenneth Paterson Information, Kenneth G. Paterson - 2006
ManTiCore: Encryption with Joint Cipher-State Authentication – Cheryl Beaver Timothy, Timothy Draelos, Mark Torgerson - 2003
1 Application of Synchronous Dynamic Encryption System (SDES) in Wireless Sensor Networks ∗ – Hamdy S. Soliman, Mohammed Omari - 2005
14 On-Line Ciphers and the Hash-CBC constructions – M. Bellare, A. Boldyreva, L. Knudsen, C. Namprempre - 2001