The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
Top Cited Papers
- 2 August 2001
- book chapter
- Published by Springer Nature
- Vol. 2001, 310-331
- https://doi.org/10.1007/3-540-44647-8_19
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- The Security of Cipher Block ChainingPublished by Springer Nature ,2001
- Does Encryption with Redundancy Provide Authenticity?Published by Springer Nature ,2001
- Analysis of Key-Exchange Protocols and Their Use for Building Secure ChannelsPublished by Springer Nature ,2001
- Advances in Cryptology — CRYPTO 2000Published by Springer Nature ,2000
- UMAC: Fast and Secure Message AuthenticationPublished by Springer Nature ,1999
- Public-key cryptography and password protocolsACM Transactions on Information and System Security, 1999
- Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1Published by Springer Nature ,1998
- Relations among notions of security for public-key encryption schemesPublished by Springer Nature ,1998
- Non-malleable cryptographyPublished by Association for Computing Machinery (ACM) ,1991
- Probabilistic encryptionJournal of Computer and System Sciences, 1984