Provably Fixing the SSH Binary Packet Protocol (2002)

Cached

Download Links

by Mihir Bellare , Tadayoshi Kohno , Chanathip Namprempre
Citations:6 - 1 self

Documents Related by Co-Citation

222 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997
14 Blockwise-Adaptive Attackers - Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC – Antoine Joux, Gwenaëlle Martinet, Frederic Valette - 2002
123 The order of encryption and authentication for protecting communications (or: how Secure is SSL?) – Hugo Krawczyk - 2001
138 On the security of joint signature and encryption – Jee Hea An, Yevgeniy Dodis, Tal Rabin - 2002
193 The Security of the Cipher Block Chaining Message Authentication Code – Mihir Bellare, Joe Kilian , Phillip Rogaway - 2000
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
62 Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography – Mihir Bellare, Phillip Rogaway
106 Parallelizable Encryption Mode with Almost Free Message Integrity – Charanjit Jutla - 2000
136 OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
10 Modular approach to the design and analysis of key exchange protocols – M Bellare, R Canetti, H Krawczyk - 1998
447 Relations among notions of security for public-key encryption schemes – Mihir Bellare, David Pointcheval, Phillip Rogaway - 1998
1172 Probabilistic encryption – S Goldwasser, S Micali - 1984
1425 Security Architecture for the Internet Protocol – Randall Atkinson - 1995
122 XOR MACS: New Methods for Message Authentication using Finite Pseudorandom Functions – Mihir Bellare, Roch Guérin, Phillip Rogaway - 1995
6 Collision free hash functions and public key signature schemes – I DAMG ˚ARD - 1987
2 Concealment and its applications to authenticated encryption,” Full version of this paper. Preliminary version appeared in Eurocrypt 03 – Y DODIS, J AN - 2003
12 Accelerated Remotely Keyed Encryption – Stefan Lucks