Douglas Stebila
Douglas Stebila
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Protocols for authentication and key establishment, Second Edition
C Boyd, A Mathuria, D Stebila
Springer, 2019
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
JW Bos, C Costello, M Naehrig, D Stebila
IEEE Symposium on Security & Privacy (S&P) 2015, 553-570, 2015
Frodo: Take off the ring! Practical, quantum-secure key exchange from LWE
J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Performance analysis of elliptic curve cryptography for SSL
V Gupta, S Gupta, S Chang, D Stebila
Proceedings of the 1st ACM workshop on Wireless security, 87-94, 2002
A formal security analysis of the signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
Journal of Cryptology 33 (4), 1914-1983, 2020
An end-to-end systems approach to elliptic curve cryptography
N Gura, SC Shantz, H Eberle, S Gupta, V Gupta, D Finchelstein, E Goupy, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 349-365, 2002
Multi-factor password-authenticated key exchange
DJ Stebila, PV Udupi, SC Shantz
US Patent 8,776,176, 2014
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
B Dowling, M Fischlin, F Günther, D Stebila
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Speeding up secure Web transactions using elliptic curve cryptography
V Gupta, D Stebila, S Fung, SC Shantz, N Gura, H Eberle
11th Annual Network and Distributed System Security Symposium (NDSS 2004), 2004
Post-quantum key exchange for the internet and the open quantum safe project
D Stebila, M Mosca
International Conference on Selected Areas in Cryptography, 14-37, 2016
Anonymity and one-way authentication in key exchange protocols
I Goldberg, D Stebila, B Ustaoglu
Designs, Codes and Cryptography 67 (2), 245-269, 2013
On the security of TLS renegotiation
F Giesen, F Kohlar, D Stebila
Proceedings of the 2013 ACM Conference on Computer & Communications Security …, 2013
Quantum one-time programs
A Broadbent, G Gutoski, D Stebila
Advances in Cryptology–CRYPTO 2013, 344-360, 2013
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
D Stebila, L Kuppusamy, J Rangasamy, C Boyd, J Gonzalez Nieto
Topics in Cryptology–CT-RSA 2011, 284-301, 2011
One-time-password-authenticated key exchange (full version)
KG Paterson, D Stebila
Australasian Conference on Information Security and Privacy (ACISP), 2010
Hierarchical deterministic Bitcoin wallets that tolerate key leakage
G Gutoski, D Stebila
International Conference on Financial Cryptography and Data Security, 497-504, 2015
Analyzing the effectiveness of graph metrics for anomaly detection in online social networks
R Hassanzadeh, R Nayak, D Stebila
Web Information Systems Engineering-WISE 2012, 624-630, 2012
M Naehrig, E Alkim, J Bos, L Ducas, K Easterbrook, B LaMacchia, ...
Technical report, National Institute of Standards and Technology, 2017
Modelling after-the-fact leakage for key exchange
J Alawatugoda, D Stebila, C Boyd
Proceedings of the 9th ACM Symposium on Information, Computer and …, 2014
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH
E Crockett, C Paquin, D Stebila
NIST 2nd Post-Quantum Cryptography Standardization Conference 2019, 2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20