Obserwuj
Douglas Stebila
Douglas Stebila
Zweryfikowany adres z uwaterloo.ca - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Protocols for authentication and key establishment, Second Edition
C Boyd, A Mathuria, D Stebila
Springer, 2019
965*2019
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
JW Bos, C Costello, M Naehrig, D Stebila
IEEE Symposium on Security & Privacy (S&P) 2015, 553-570, 2015
4162015
Frodo: Take off the ring! Practical, quantum-secure key exchange from LWE
J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
4142016
A formal security analysis of the Signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
Journal of Cryptology 33 (4), 1914-1983, 2020
3552020
Performance analysis of elliptic curve cryptography for SSL
V Gupta, S Gupta, S Chang, D Stebila
Proceedings of the 1st ACM workshop on Wireless security, 87-94, 2002
2752002
An end-to-end systems approach to elliptic curve cryptography
N Gura, SC Shantz, H Eberle, S Gupta, V Gupta, D Finchelstein, E Goupy, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 349-365, 2002
1992002
Multi-factor password-authenticated key exchange
DJ Stebila, PV Udupi, SC Shantz
US Patent 8,776,176, 2014
1682014
A cryptographic analysis of the TLS 1.3 handshake protocol candidates
B Dowling, M Fischlin, F Günther, D Stebila
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1432015
Post-quantum key exchange for the Internet and the Open Quantum Safe project
D Stebila, M Mosca
International Conference on Selected Areas in Cryptography, 14-37, 2016
1352016
Speeding up secure web transactions using elliptic curve cryptography
V Gupta, D Stebila, S Fung, SC Shantz, N Gura, H Eberle
11th Annual Network and Distributed System Security Symposium (NDSS 2004), 2004
1022004
Quantum one-time programs
A Broadbent, G Gutoski, D Stebila
Advances in Cryptology–CRYPTO 2013, 344-360, 2013
882013
Anonymity and one-way authentication in key exchange protocols
I Goldberg, D Stebila, B Ustaoglu
Designs, Codes and Cryptography 67 (2), 245-269, 2013
812013
On the security of TLS renegotiation
F Giesen, F Kohlar, D Stebila
Proceedings of the 2013 ACM Conference on Computer & Communications Security …, 2013
762013
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH
E Crockett, C Paquin, D Stebila
NIST 2nd Post-Quantum Cryptography Standardization Conference 2019, 2019
752019
Post-quantum TLS without handshake signatures
P Schwabe, D Stebila, T Wiggers
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
682020
Hierarchical deterministic Bitcoin wallets that tolerate key leakage
G Gutoski, D Stebila
International Conference on Financial Cryptography and Data Security, 497-504, 2015
682015
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
D Stebila, L Kuppusamy, J Rangasamy, C Boyd, J Gonzalez Nieto
Topics in Cryptology–CT-RSA 2011, 284-301, 2011
682011
FrodoKEM
M Naehrig, E Alkim, J Bos, L Ducas, K Easterbrook, B LaMacchia, ...
Technical report, National Institute of Standards and Technology, 2017
662017
Benchmarking post-quantum cryptography in TLS
C Paquin, D Stebila, G Tamvada
International Conference on Post-Quantum Cryptography, 72-91, 2020
652020
Secure logging schemes and Certificate Transparency
B Dowling, F Günther, U Herath, D Stebila
European Symposium on Research in Computer Security, 140-158, 2016
632016
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20