Proving the TLS Handshake Secure (As It Is)
- 1 January 2014
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLSPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Implementing TLS with Verified Cryptographic SecurityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Modular code-based cryptographic verificationPublished by Association for Computing Machinery (ACM) ,2011
- Computer-Aided Security Proofs for the Working CryptographerPublished by Springer Nature ,2011
- Cryptographic Agility and Its Relation to Circular EncryptionPublished by Springer Nature ,2010
- The Transport Layer Security (TLS) Protocol Version 1.2Published by RFC Editor ,2008
- Relaxing Chosen-Ciphertext SecurityPublished by Springer Nature ,2003
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext AttackSIAM Journal on Computing, 2003
- Entity Authentication and Key DistributionPublished by Springer Nature ,2001
- Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1Published by Springer Nature ,1998