| # Key Exchange Protocols |
| |
| @inproceedings{cremers2011examining, |
| title={Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK}, |
| author={Cremers, Cas}, |
| booktitle={Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security}, |
| pages={80--91}, |
| year={2011}, |
| organization={ACM} |
| } |
| |
| @article{needham1978using, |
| title={Using encryption for authentication in large networks of computers}, |
| author={Needham, Roger M and Schroeder, Michael D}, |
| journal={Communications of the ACM}, |
| volume={21}, |
| number={12}, |
| pages={993--999}, |
| year={1978}, |
| publisher={ACM} |
| } |
| |
| @article{dolev1983security, |
| title={On the security of public key protocols}, |
| author={Dolev, Danny and Yao, Andrew}, |
| journal={IEEE Transactions on information theory}, |
| volume={29}, |
| number={2}, |
| pages={198--208}, |
| year={1983}, |
| publisher={IEEE} |
| } |
| |
| @inproceedings{gajek2008universally, |
| title={Universally composable security analysis of TLS}, |
| author={Gajek, Sebastian and Manulis, Mark and Pereira, Olivier and Sadeghi, Ahmad-Reza and Schwenk, J{\"o}rg}, |
| booktitle={International Conference on Provable Security}, |
| pages={313--327}, |
| year={2008}, |
| organization={Springer} |
| } |
| |
| @inproceedings{krawczyk2016unilateral, |
| title={A unilateral-to-mutual authentication compiler for key exchange (with applications to client authentication in tls 1.3)}, |
| author={Krawczyk, Hugo}, |
| booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, |
| pages={1438--1450}, |
| year={2016}, |
| organization={ACM} |
| } |
| |
| @inproceedings{mitchell1998finite, |
| title={Finite-State Analysis of SSL 3.0.}, |
| author={Mitchell, John C and Shmatikov, Vitaly and Stern, Ulrich}, |
| booktitle={USENIX Security Symposium}, |
| pages={201--216}, |
| year={1998} |
| } |
| |
| @inproceedings{wagner1996analysis, |
| title={Analysis of the SSL 3.0 protocol}, |
| author={Wagner, David and Schneier, Bruce and others}, |
| booktitle={The Second USENIX Workshop on Electronic Commerce Proceedings}, |
| volume={1}, |
| number={1}, |
| pages={29--40}, |
| year={1996} |
| } |
| |
| @article{dowlingcryptographic, |
| title={A Cryptographic Analysis of the WireGuard Protocol}, |
| author={Dowling, Benjamin and Paterson, Kenneth G} |
| } |
| |
| @article{kusters2017framework, |
| title={A Framework for Universally Composable Diffie-Hellman Key Exchange.}, |
| author={K{\"u}sters, Ralf and Rausch, Daniel}, |
| journal={IACR Cryptology ePrint Archive}, |
| volume={2017}, |
| pages={256}, |
| year={2017} |
| } |
| |
| @inproceedings{boyd2016stateless, |
| title={From stateless to stateful: Generic authentication and authenticated encryption constructions with application to TLS}, |
| author={Boyd, Colin and Hale, Britta and Mj{\o}lsnes, Stig Frode and Stebila, Douglas}, |
| booktitle={Cryptographers’ Track at the RSA Conference}, |
| pages={55--71}, |
| year={2016}, |
| organization={Springer} |
| } |
| |
| @inproceedings{krawczyk2001order, |
| title={The order of encryption and authentication for protecting communications (or: How secure is SSL?)}, |
| author={Krawczyk, Hugo}, |
| booktitle={Advances in Cryptology—CRYPTO 2001}, |
| pages={310--331}, |
| year={2001}, |
| organization={Springer} |
| } |
| |
| @inproceedings{kudla2005modular, |
| title={Modular security proofs for key agreement protocols}, |
| author={Kudla, Caroline and Paterson, Kenneth G}, |
| booktitle={International Conference on the Theory and Application of Cryptology and Information Security}, |
| pages={549--565}, |
| year={2005}, |
| organization={Springer} |
| } |
| |
| @article{brzuska2013less, |
| title={Less is more: Relaxed yet composable security notions for key exchange}, |
| author={Brzuska, Christina and Fischlin, Marc and Smart, Nigel P and Warinschi, Bogdan and Williams, Stephen C}, |
| journal={International Journal of Information Security}, |
| volume={12}, |
| number={4}, |
| pages={267--297}, |
| year={2013}, |
| publisher={Springer} |
| } |
| |
| @inproceedings{boyd2013asics, |
| title={ASICS: Authenticated key exchange security incorporating certification systems}, |
| author={Boyd, Colin and Cremers, Cas and Feltz, Michele and Paterson, Kenneth G and Poettering, Bertram and Stebila, Douglas}, |
| booktitle={European Symposium on Research in Computer Security}, |
| pages={381--399}, |
| year={2013}, |
| organization={Springer} |
| } |
| |
| @phdthesis{brzuska2013foundations, |
| title={On the foundations of key exchange}, |
| author={Brzuska, Christina}, |
| year={2013}, |
| school={Technische Universit{\"a}t} |
| } |
| |
| @inproceedings{bellare1993entity, |
| title={Entity Authentication and Key Distribution.}, |
| author={Bellare, Mihir and Rogaway, Phillip}, |
| booktitle={Crypto}, |
| volume={93}, |
| pages={232--249}, |
| year={1993}, |
| organization={Springer} |
| } |
| |
| @article{cremers2015beyond, |
| title={Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal}, |
| author={Cremers, Cas and Feltz, Michele}, |
| journal={Designs, Codes and Cryptography}, |
| volume={74}, |
| number={1}, |
| pages={183--218}, |
| year={2015}, |
| publisher={Springer} |
| } |
| |
| @article{law2003efficient, |
| title={An efficient protocol for authenticated key agreement}, |
| author={Law, Laurie and Menezes, Alfred and Qu, Minghua and Solinas, Jerry and Vanstone, Scott}, |
| journal={Designs, Codes and Cryptography}, |
| volume={28}, |
| number={2}, |
| pages={119--134}, |
| year={2003}, |
| publisher={Springer} |
| } |
| |
| @inproceedings{bellare1995provably, |
| title={Provably secure session key distribution: the three party case}, |
| author={Bellare, Mihir and Rogaway, Phillip}, |
| booktitle={Proceedings of the twenty-seventh annual ACM symposium on Theory of computing}, |
| pages={57--66}, |
| year={1995}, |
| organization={ACM} |
| } |
| |
| @inproceedings{krawczyk2016optls, |
| title={The OPTLS protocol and TLS 1.3}, |
| author={Krawczyk, Hugo and Wee, Hoeteck}, |
| booktitle={Security and Privacy (EuroS\&P), 2016 IEEE European Symposium on}, |
| pages={81--96}, |
| year={2016}, |
| organization={IEEE} |
| } |
| |
| @inproceedings{cremers2016automated, |
| title={Automated analysis and verification of TLS 1.3: 0-RTT, resumption and delayed authentication}, |
| author={Cremers, Cas and Horvat, Marko and Scott, Sam and van der Merwe, Thyla}, |
| booktitle={Security and Privacy (SP), 2016 IEEE Symposium on}, |
| pages={470--485}, |
| year={2016}, |
| organization={IEEE} |
| } |
| |
| @article{dowling2016cryptographic, |
| title={A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.}, |
| author={Dowling, Benjamin and Fischlin, Marc and G{\"u}nther, Felix and Stebila, Douglas}, |
| journal={IACR Cryptology ePrint Archive}, |
| volume={2016}, |
| pages={81}, |
| year={2016} |
| } |
| |
| @inproceedings{zhao2016identity, |
| title={Identity-Concealed Authenticated Encryption and Key Exchange}, |
| author={Zhao, Yunlei}, |
| booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, |
| pages={1464--1479}, |
| year={2016}, |
| organization={ACM} |
| } |
| |
| @inproceedings{krawczyk2003sigma, |
| title={SIGMA: The ‘SIGn-and-MAc’approach to authenticated Diffie-Hellman and its use in the IKE protocols}, |
| author={Krawczyk, Hugo}, |
| booktitle={Annual International Cryptology Conference}, |
| pages={400--425}, |
| year={2003}, |
| organization={Springer} |
| } |
| |
| @inproceedings{krawczyk2005hmqv, |
| title={HMQV: A high-performance secure Diffie-Hellman protocol}, |
| author={Krawczyk, Hugo}, |
| booktitle={Annual International Cryptology Conference}, |
| pages={546--566}, |
| year={2005}, |
| organization={Springer} |
| } |
| |
| @inproceedings{he2005modular, |
| title={A modular correctness proof of IEEE 802.11 i and TLS}, |
| author={He, Changhua and Sundararajan, Mukund and Datta, Anupam and Derek, Ante and Mitchell, John C}, |
| booktitle={Proceedings of the 12th ACM conference on Computer and communications security}, |
| pages={2--15}, |
| year={2005}, |
| organization={ACM} |
| } |
| |
| @article{aiello2004just, |
| title={Just fast keying: Key agreement in a hostile internet}, |
| author={Aiello, William and Bellovin, Steven M and Blaze, Matt and Canetti, Ran and Ioannidis, John and Keromytis, Angelos D and Reingold, Omer}, |
| journal={ACM Transactions on Information and System Security (TISSEC)}, |
| volume={7}, |
| number={2}, |
| pages={242--273}, |
| year={2004}, |
| publisher={ACM} |
| } |
| |
| @inproceedings{boyd2004key, |
| title={Key agreement using statically keyed authenticators}, |
| author={Boyd, Colin and Mao, Wenbo and Paterson, Kenneth G}, |
| booktitle={International Conference on Applied Cryptography and Network Security}, |
| pages={248--262}, |
| year={2004}, |
| organization={Springer} |
| } |
| |
| @article{menezes2007another, |
| title={Another look at HMQV}, |
| author={Menezes, Alfred}, |
| journal={Mathematical Cryptology JMC}, |
| volume={1}, |
| number={1}, |
| pages={47--64}, |
| year={2007} |
| } |
| |
| @inproceedings{lamacchia2007stronger, |
| title={Stronger security of authenticated key exchange}, |
| author={LaMacchia, Brian and Lauter, Kristin and Mityagin, Anton}, |
| booktitle={International Conference on Provable Security}, |
| pages={1--16}, |
| year={2007}, |
| organization={Springer} |
| } |
| |
| @inproceedings{bos2015post, |
| title={Post-quantum key exchange for the TLS protocol from the ring learning with errors problem}, |
| author={Bos, Joppe W and Costello, Craig and Naehrig, Michael and Stebila, Douglas}, |
| booktitle={Security and Privacy (SP), 2015 IEEE Symposium on}, |
| pages={553--570}, |
| year={2015}, |
| organization={IEEE} |
| } |
| |
| @inproceedings{di2006deniable, |
| title={Deniable authentication and key exchange}, |
| author={Di Raimondo, Mario and Gennaro, Rosario and Krawczyk, Hugo}, |
| booktitle={Proceedings of the 13th ACM conference on Computer and communications security}, |
| pages={400--409}, |
| year={2006}, |
| organization={ACM} |
| } |
| |
| @inproceedings{choo2005session, |
| title={On session key construction in provably-secure key establishment protocols}, |
| author={Choo, Kim-Kwang Raymond and Boyd, Colin and Hitchcock, Yvonne}, |
| booktitle={International Conference on Cryptology in Malaysia}, |
| pages={116--131}, |
| year={2005}, |
| organization={Springer} |
| } |
| |
| @article{goldberg2012anonymity, |
| title={Anonymity and one-way authentication in key exchange protocols}, |
| author={Goldberg, Ian and Stebila, Douglas and Ustaoglu, Berkant}, |
| journal={Designs, Codes and Cryptography}, |
| pages={1--25}, |
| year={2012}, |
| publisher={Springer} |
| } |
| |
| @inproceedings{yao2010deniable, |
| title={Deniable internet key exchange}, |
| author={Yao, Andrew C and Zhao, Yunlei}, |
| booktitle={International Conference on Applied Cryptography and Network Security}, |
| pages={329--348}, |
| year={2010}, |
| organization={Springer} |
| } |
| |
| @article{cremers2011one, |
| title={One-round strongly secure key exchange with perfect forward secrecy and deniability}, |
| author={Cremers, Cas and Feltz, Michele}, |
| journal={IACR Cryptology ePrint Archive}, |
| volume={2011}, |
| pages={300}, |
| year={2011} |
| } |
| |
| @article{harn2005authenticated, |
| title={Authenticated Diffie--Hellman key agreement protocol using a single cryptographic assumption}, |
| author={Harn, Lein and Hsin, W-J and Mehta, Mohit}, |
| journal={IEE Proceedings-Communications}, |
| volume={152}, |
| number={4}, |
| pages={404--410}, |
| year={2005}, |
| publisher={IET} |
| } |
| |
| @phdthesis{datta2005security, |
| title={Security analysis of network protocols: Compositional reasoning and complexity-theoretic foundations}, |
| author={Datta, Anupam}, |
| year={2005}, |
| school={Citeseer} |
| } |
| |
| @article{menezes2010reusing, |
| title={On reusing ephemeral keys in Diffie-Hellman key agreement protocols}, |
| author={Menezes, Alfred and Ustaoglu, Berkant}, |
| journal={International Journal of Applied Cryptography}, |
| volume={2}, |
| number={2}, |
| pages={154--158}, |
| year={2010}, |
| publisher={Inderscience Publishers} |
| } |
| |
| @inproceedings{yao2013oake, |
| title={OAKE: a new family of implicitly authenticated diffie-hellman protocols}, |
| author={Yao, Andrew Chi-Chih and Zhao, Yunlei}, |
| booktitle={Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security}, |
| pages={1113--1128}, |
| year={2013}, |
| organization={ACM} |
| } |
| |
| @inproceedings{zhang2015authenticated, |
| title={Authenticated key exchange from ideal lattices}, |
| author={Zhang, Jiang and Zhang, Zhenfeng and Ding, Jintai and Snook, Michael and Dagdelen, {\"O}zg{\"u}r}, |
| booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques}, |
| pages={719--751}, |
| year={2015}, |
| organization={Springer} |
| } |
| |
| @inproceedings{jiang2008efficient, |
| title={An efficient deniable key exchange protocol}, |
| author={Jiang, Shaoquan and Safavi-Naini, Reihaneh}, |
| booktitle={International Conference on Financial Cryptography and Data Security}, |
| pages={47--52}, |
| year={2008}, |
| organization={Springer} |
| } |
| |
| @inproceedings{yang2011authenticated, |
| title={Authenticated key exchange under bad randomness}, |
| author={Yang, Guomin and Duan, Shanshan and Wong, Duncan S and Tan, Chik How and Wang, Huaxiong}, |
| booktitle={International Conference on Financial Cryptography and Data Security}, |
| pages={113--126}, |
| year={2011}, |
| organization={Springer} |
| } |
| |
| @article{singh2015practical, |
| title={A Practical Key Exchange for the Internet using Lattice Cryptography.}, |
| author={Singh, Vikram}, |
| journal={IACR Cryptology ePrint Archive}, |
| volume={2015}, |
| pages={138}, |
| year={2015} |
| } |
| |
| @inproceedings{yi2011three, |
| title={Three-party password-authenticated key exchange without random oracles}, |
| author={Yi, Xun and Tso, Raylin and Okamoto, Eiji}, |
| booktitle={Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on}, |
| pages={15--24}, |
| year={2011}, |
| organization={IEEE} |
| } |
| |
| @phdthesis{jost2014constructive, |
| title={A constructive analysis of IPsec}, |
| author={Jost, Daniel}, |
| year={2014}, |
| school={Citeseer} |
| } |
| |
| @inproceedings{chen2016strongly, |
| title={Strongly leakage-resilient authenticated key exchange}, |
| author={Chen, Rongmao and Mu, Yi and Yang, Guomin and Susilo, Willy and Guo, Fuchun}, |
| booktitle={Cryptographers’ Track at the RSA Conference}, |
| pages={19--36}, |
| year={2016}, |
| organization={Springer} |
| } |
| |
| @article{feltz2014limits, |
| title={On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness.}, |
| author={Feltz, Michele and Cremers, Cas}, |
| journal={IACR Cryptology ePrint Archive}, |
| volume={2014}, |
| pages={369}, |
| year={2014} |
| } |
| |
| @article{katz2010one, |
| title={One-Round Password-Based Authenticated Key Exchange.}, |
| author={Katz, Jonathan and Vaikuntanathan, Vinod}, |
| journal={IACR Cryptology ePrint Archive}, |
| volume={2010}, |
| pages={368}, |
| year={2010}, |
| publisher={Citeseer} |
| } |
| |
| @inproceedings{liu2013security, |
| title={Security model and analysis of FHMQV, revisited}, |
| author={Liu, Shengli and Sakurai, Kouichi and Weng, Jian and Zhang, Fangguo and Zhao, Yunlei}, |
| booktitle={International Conference on Information Security and Cryptology}, |
| pages={255--269}, |
| year={2013}, |
| organization={Springer} |
| } |
| |
| @inproceedings{jager2015security, |
| title={On the security of TLS 1.3 and QUIC against weaknesses in PKCS\# 1 v1. 5 encryption}, |
| author={Jager, Tibor and Schwenk, J{\"o}rg and Somorovsky, Juraj}, |
| booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, |
| pages={1185--1196}, |
| year={2015}, |
| organization={ACM} |
| } |
| |
| @article{lan2017investigating, |
| title={Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3}, |
| author={Lan, Xiao and Xu, Jing and Zhang, Zhenfeng and Zhu, Wen Tao}, |
| journal={IEEE Transactions on Dependable and Secure Computing}, |
| year={2017}, |
| publisher={IEEE} |
| } |
| |
| @inproceedings{dowling2015modelling, |
| title={Modelling ciphersuite and version negotiation in the TLS protocol}, |
| author={Dowling, Benjamin and Stebila, Douglas}, |
| booktitle={Australasian Conference on Information Security and Privacy}, |
| pages={270--288}, |
| year={2015}, |
| organization={Springer} |
| } |
| |
| @inproceedings{li2016multiple, |
| title={Multiple handshakes security of TLS 1.3 candidates}, |
| author={Li, Xinyu and Xu, Jing and Zhang, Zhenfeng and Feng, Dengguo and Hu, Honggang}, |
| booktitle={Security and Privacy (SP), 2016 IEEE Symposium on}, |
| pages={486--505}, |
| year={2016}, |
| organization={IEEE} |
| } |
| |
| @inproceedings{fischlin2016key, |
| title={Key confirmation in key exchange: a formal treatment and implications for TLS 1.3}, |
| author={Fischlin, Marc and G{\"u}nther, Felix and Schmidt, Benedikt and Warinschi, Bogdan}, |
| booktitle={Security and Privacy (SP), 2016 IEEE Symposium on}, |
| pages={452--469}, |
| year={2016}, |
| organization={IEEE} |
| } |
| |
| @inproceedings{bellare2000authenticated, |
| title={Authenticated key exchange secure against dictionary attacks}, |
| author={Bellare, Mihir and Pointcheval, David and Rogaway, Phillip}, |
| booktitle={Advances in Cryptology—EUROCRYPT 2000}, |
| pages={139--155}, |
| year={2000}, |
| organization={Springer} |
| } |
| |
| @inproceedings{canetti2001analysis, |
| title={Analysis of key-exchange protocols and their use for building secure channels}, |
| author={Canetti, Ran and Krawczyk, Hugo}, |
| booktitle={International Conference on the Theory and Applications of Cryptographic Techniques}, |
| pages={453--474}, |
| year={2001}, |
| organization={Springer} |
| } |
| |
| @article{blake1997key, |
| title={Key agreement protocols and their security analysis}, |
| author={Blake-Wilson, Simon and Johnson, Don and Menezes, Alfred}, |
| journal={Crytography and Coding}, |
| pages={30--45}, |
| year={1997}, |
| publisher={Springer} |
| } |
| |
| @inproceedings{blake1998authenticated, |
| title={Authenticated Diffe-Hellman key agreement protocols}, |
| author={Blake-Wilson, Simon and Menezes, Alfred}, |
| booktitle={International Workshop on Selected Areas in Cryptography}, |
| pages={339--361}, |
| year={1998}, |
| organization={Springer} |
| } |
| |
| @inproceedings{bellare1998modular, |
| title={A modular approach to the design and analysis of authentication and key exchange protocols}, |
| author={Bellare, Mihir and Canetti, Ran and Krawczyk, Hugo}, |
| booktitle={Proceedings of the thirtieth annual ACM symposium on Theory of computing}, |
| pages={419--428}, |
| year={1998}, |
| organization={ACM} |
| } |
| |
| @article{shoup1999formal, |
| title={On formal models for secure key exchange}, |
| author={Shoup, Victor}, |
| year={1999}, |
| publisher={Citeseer} |
| } |
| |
| @inproceedings{canetti2002universally, |
| title={Universally composable notions of key exchange and secure channels}, |
| author={Canetti, Ran and Krawczyk, Hugo}, |
| booktitle={International Conference on the Theory and Applications of Cryptographic Techniques}, |
| pages={337--351}, |
| year={2002}, |
| organization={Springer} |
| } |
| |
| @inproceedings{lincoln1998probabilistic, |
| title={A probabilistic poly-time framework for protocol analysis}, |
| author={Lincoln, Patrick and Mitchell, John and Mitchell, Mark and Scedrov, Andre}, |
| booktitle={Proceedings of the 5th ACM conference on Computer and communications security}, |
| pages={112--121}, |
| year={1998}, |
| organization={ACM} |
| } |
| |
| @inproceedings{choo2005examining, |
| title={Examining indistinguishability-based proof models for key establishment protocols}, |
| author={Choo, Kim-Kwang Raymond and Boyd, Colin and Hitchcock, Yvonne}, |
| booktitle={International Conference on the Theory and Application of Cryptology and Information Security}, |
| pages={585--604}, |
| year={2005}, |
| organization={Springer} |
| } |
| |
| @article{katz2007scalable, |
| title={Scalable protocols for authenticated group key exchange}, |
| author={Katz, Jonathan and Yung, Moti}, |
| journal={Journal of Cryptology}, |
| volume={20}, |
| number={1}, |
| pages={85--113}, |
| year={2007}, |
| publisher={Springer} |
| } |
| |
| @inproceedings{katz2002forward, |
| title={Forward secrecy in password-only key exchange protocols}, |
| author={Katz, Jonathan and Ostrovsky, Rafail and Yung, Moti}, |
| booktitle={International Conference on Security in Communication Networks}, |
| pages={29--44}, |
| year={2002}, |
| organization={Springer} |
| } |
| |
| @article{cheng2005indistinguishability, |
| title={On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases.}, |
| author={Cheng, Zhaohui and Nistazakis, Manos and Comley, Richard and Vasiu, Luminita}, |
| journal={IACR Cryptology ePrint Archive}, |
| volume={2005}, |
| pages={129}, |
| year={2005}, |
| publisher={Citeseer} |
| } |
| |
| @inproceedings{morrissey2008modular, |
| title={A modular security analysis of the TLS handshake protocol}, |
| author={Morrissey, Paul and Smart, Nigel P and Warinschi, Bogdan}, |
| booktitle={International Conference on the Theory and Application of Cryptology and Information Security}, |
| pages={55--73}, |
| year={2008}, |
| organization={Springer} |
| } |
| |
| @inproceedings{boyd2003deniable, |
| title={Deniable authenticated key establishment for internet protocols}, |
| author={Boyd, Colin and Mao, Wenbo and Paterson, Kenneth G}, |
| booktitle={International Workshop on Security Protocols}, |
| pages={255--271}, |
| year={2003}, |
| organization={Springer} |
| } |
| |
| @inproceedings{groce2010new, |
| title={A new framework for efficient password-based authenticated key exchange}, |
| author={Groce, Adam and Katz, Jonathan}, |
| booktitle={Proceedings of the 17th ACM conference on Computer and communications security}, |
| pages={516--525}, |
| year={2010}, |
| organization={ACM} |
| } |
| |
| @article{mackenzie2001security, |
| title={On the Security of the SPEKE Password-Authenticated Key Exchange Protocol.}, |
| author={MacKenzie, Philip}, |
| journal={IACR Cryptology ePrint Archive}, |
| volume={2001}, |
| pages={57}, |
| year={2001} |
| } |
| |
| @inproceedings{sarr2010new, |
| title={A new security model for authenticated key agreement}, |
| author={Sarr, Augustin P and Elbaz-Vincent, Philippe and Bajard, Jean-Claude}, |
| booktitle={International Conference on Security and Cryptography for Networks}, |
| pages={219--234}, |
| year={2010}, |
| organization={Springer} |
| } |
| |
| @phdthesis{katz2002efficient, |
| title={Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks}, |
| author={Katz, Jonathan}, |
| year={2002}, |
| school={COLUMBIA UNIVERSITY} |
| } |
| |
| @article{goldreich2006session, |
| title={Session-key generation using human passwords only}, |
| author={Goldreich, Oded and Lindell, Yehuda}, |
| journal={Journal of Cryptology}, |
| volume={19}, |
| number={3}, |
| pages={241--340}, |
| year={2006}, |
| publisher={Springer} |
| } |
| |
| @inproceedings{choo2005security, |
| title={Security requirements for key establishment proof models: revisiting Bellare--Rogaway and Jeong--Katz--Lee protocols}, |
| author={Choo, Kim-Kwang Raymond and Hitchcock, Yvonne}, |
| booktitle={Australasian Conference on Information Security and Privacy}, |
| pages={429--442}, |
| year={2005}, |
| organization={Springer} |
| } |
| |
| @inproceedings{kusters2011composition, |
| title={Composition theorems without pre-established session identifiers}, |
| author={K{\"u}sters, Ralf and Tuengerthal, Max}, |
| booktitle={Proceedings of the 18th ACM conference on Computer and communications security}, |
| pages={41--50}, |
| year={2011}, |
| organization={ACM} |
| } |
| |
| @inproceedings{bresson2007security, |
| title={On security models and compilers for group key exchange protocols}, |
| author={Bresson, Emmanuel and Manulis, Mark and Schwenk, J{\"o}rg}, |
| booktitle={International Workshop on Security}, |
| pages={292--307}, |
| year={2007}, |
| organization={Springer} |
| } |
| |
| @article{morrissey2010tls, |
| title={The TLS handshake protocol: A modular analysis}, |
| author={Morrissey, Paul and Smart, Nigel P and Warinschi, Bogdan}, |
| journal={Journal of Cryptology}, |
| volume={23}, |
| number={2}, |
| pages={187--223}, |
| year={2010}, |
| publisher={Springer} |
| } |
| |
| @inproceedings{brzuska2011composability, |
| title={Composability of Bellare-Rogaway key exchange protocols}, |
| author={Brzuska, Christina and Fischlin, Marc and Warinschi, Bogdan and Williams, Stephen C}, |
| booktitle={Proceedings of the 18th ACM conference on Computer and communications security}, |
| pages={51--62}, |
| year={2011}, |
| organization={ACM} |
| } |
| |
| @inproceedings{tin2003provably, |
| title={Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach}, |
| author={Tin, Yiu Shing Terry and Boyd, Colin and Nieto, Juan Manuel Gonz{\'a}lez}, |
| booktitle={Australasian Conference on Information Security and Privacy}, |
| pages={166--179}, |
| year={2003}, |
| organization={Springer} |
| } |
| |
| @phdthesis{choo2006key, |
| title={Key Establishment: Proofs and Refutations}, |
| author={Choo, Kim-Kwang Raymond}, |
| year={2006}, |
| school={Queensland University of Technology} |
| } |
| |
| @inproceedings{zhang2010deniable, |
| title={A deniable group key establishment protocol in the standard model}, |
| author={Zhang, Yazhe and Wang, Kunpeng and Li, Bao}, |
| booktitle={International Conference on Information Security Practice and Experience}, |
| pages={308--323}, |
| year={2010}, |
| organization={Springer} |
| } |
| |
| @article{hitchcock2006modular, |
| title={Modular proofs for key exchange: rigorous optimizations in the Canetti--Krawczyk model}, |
| author={Hitchcock, Yvonne and Boyd, Colin and Gonz{\'a}lez Nieto, Juan Manuel}, |
| journal={Applicable Algebra in Engineering, Communication and Computing}, |
| volume={16}, |
| number={6}, |
| pages={405--438}, |
| year={2006}, |
| publisher={Springer} |
| } |
| |
| @article{jager2011standard, |
| title={A Standard-Model Security Analysis of TLS-DHE.}, |
| author={Jager, Tibor and Kohlar, Florian and Sch{\"a}ge, Sven and Schwenk, J{\"o}rg}, |
| journal={IACR Cryptology ePrint Archive}, |
| volume={2011}, |
| number={219}, |
| year={2011} |
| } |
| |
| @incollection{jager2012security, |
| title={On the security of TLS-DHE in the standard model}, |
| author={Jager, Tibor and Kohlar, Florian and Sch{\"a}ge, Sven and Schwenk, J{\"o}rg}, |
| booktitle={Advances in Cryptology--CRYPTO 2012}, |
| pages={273--293}, |
| year={2012}, |
| publisher={Springer} |
| } |
| |
| ### INCOMPLETE, financial crypto 2017 |
| @article{dodisunilaterally, |
| title={Unilaterally-Authenticated Key Exchange}, |
| author={Dodis, Yevgeniy and Fiore, Dario} |
| } |
| |
| @inproceedings{bhargavan2017content, |
| title={Content Delivery over TLS: A Cryptographic Analysis of Keyless SSL}, |
| author={Bhargavan, Karthikeyan and Boureanu, IC and Fouque, Pierre-Alain and Onete, Cristina and Richard, Benjamin}, |
| booktitle={Proceedings of the 2nd IEEE European Symposium on Security and Privacy}, |
| year={2017} |
| } |
| |
| @inproceedings{gunther20170, |
| title={0-RTT Key Exchange with Full Forward Secrecy}, |
| author={G{\"u}nther, Felix and Hale, Britta and Jager, Tibor and Lauer, Sebastian}, |
| booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques}, |
| pages={519--548}, |
| year={2017}, |
| organization={Springer} |
| } |
| |
| # Attacks and Real-World Protocols |
| |
| @inproceedings{lauter2006security, |
| title={Security analysis of KEA authenticated key exchange protocol}, |
| author={Lauter, Kristin and Mityagin, Anton}, |
| booktitle={Public Key Cryptography}, |
| volume={3958}, |
| pages={378--394}, |
| year={2006}, |
| organization={Springer} |
| } |
| |
| @inproceedings{jager2015practical, |
| title={Practical invalid curve attacks on TLS-ECDH}, |
| author={Jager, Tibor and Schwenk, J{\"o}rg and Somorovsky, Juraj}, |
| booktitle={European Symposium on Research in Computer Security}, |
| pages={407--425}, |
| year={2015}, |
| organization={Springer} |
| } |
| |
| @inproceedings{bhargavan2016transcript, |
| title={Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH}, |
| author={Bhargavan, Karthikeyan and Leurent, Ga{\"e}tan}, |
| booktitle={Network and Distributed System Security Symposium--NDSS 2016}, |
| year={2016} |
| } |
| |
| @inproceedings{bhargavan2016downgrade, |
| title={Downgrade resilience in key-exchange protocols}, |
| author={Bhargavan, Karthikeyan and Brzuska, Christina and Fournet, C{\'e}dric and Green, Matthew and Kohlweiss, Markulf and Zanella-B{\'e}guelin, Santiago}, |
| booktitle={Security and Privacy (SP), 2016 IEEE Symposium on}, |
| pages={506--525}, |
| year={2016}, |
| organization={IEEE} |
| } |
| |
| @inproceedings{aviram2016drown, |
| title={DROWN: breaking TLS using SSLv2}, |
| author={Aviram, Nimrod and Schinzel, Sebastian and Somorovsky, Juraj and Heninger, Nadia and Dankel, Maik and Steube, Jens and Valenta, Luke and Adrian, David and Halderman, J Alex and Dukhovni, Viktor and others}, |
| booktitle={25th USENIX Security Symposium (USENIX Security 16)(Aug. 2016)}, |
| year={2016} |
| } |
| |
| @inproceedings{meyer2014revisiting, |
| title={Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.}, |
| author={Meyer, Christopher and Somorovsky, Juraj and Weiss, Eugen and Schwenk, J{\"o}rg and Schinzel, Sebastian and Tews, Erik}, |
| booktitle={USENIX Security}, |
| volume={14}, |
| pages={733--748}, |
| year={2014} |
| } |
| |
| @inproceedings{albrecht2016lucky, |
| title={Lucky Microseconds: A timing attack on amazon’s s2n implementation of TLS}, |
| author={Albrecht, Martin R and Paterson, Kenneth G}, |
| booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques}, |
| pages={622--643}, |
| year={2016}, |
| organization={Springer} |
| } |
| |
| @inproceedings{garman2015attacks, |
| title={Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS.}, |
| author={Garman, Christina and Paterson, Kenneth G and Van der Merwe, Thyla}, |
| booktitle={USENIX Security}, |
| pages={113--128}, |
| year={2015} |
| } |
| |
| @article{kaliski2001unknown, |
| title={An unknown key-share attack on the MQV key agreement protocol}, |
| author={Kaliski Jr, Burton S}, |
| journal={ACM Transactions on Information and System Security (TISSEC)}, |
| volume={4}, |
| number={3}, |
| pages={275--288}, |
| year={2001}, |
| publisher={ACM} |
| } |
| |
| @inproceedings{giesen2013security, |
| title={On the security of TLS renegotiation}, |
| author={Giesen, Florian and Kohlar, Florian and Stebila, Douglas}, |
| booktitle={Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security}, |
| pages={387--398}, |
| year={2013}, |
| organization={ACM} |
| } |
| |
| @incollection{krawczyk2013security, |
| title={On the security of the TLS protocol: A systematic analysis}, |
| author={Krawczyk, Hugo and Paterson, Kenneth G and Wee, Hoeteck}, |
| booktitle={Advances in Cryptology--CRYPTO 2013}, |
| pages={429--448}, |
| year={2013}, |
| publisher={Springer} |
| } |
| |
| # Verified Implementations |
| |
| @article{bhargavan2016mitls, |
| title={miTLS: Verifying Protocol Implementations against Real-World Attacks}, |
| author={Bhargavan, Karthikeyan and Fournet, Cedric and Kohlweiss, Markulf}, |
| journal={IEEE Security \& Privacy}, |
| volume={14}, |
| number={6}, |
| pages={18--25}, |
| year={2016}, |
| publisher={IEEE} |
| } |
| |
| @inproceedings{kusters2009using, |
| title={Using ProVerif to analyze protocols with Diffie-Hellman exponentiation}, |
| author={K{\"u}sters, Ralf and Truderung, Tomasz}, |
| booktitle={Computer Security Foundations Symposium, 2009. CSF'09. 22nd IEEE}, |
| pages={157--171}, |
| year={2009}, |
| organization={IEEE} |
| } |
| |
| @inproceedings{barthe2015mind, |
| title={Mind the gap: Modular machine-checked proofs of one-round key exchange protocols}, |
| author={Barthe, Gilles and Crespo, Juan Manuel and Lakhnech, Yassine and Schmidt, Benedikt}, |
| booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques}, |
| pages={689--718}, |
| year={2015}, |
| organization={Springer} |
| } |
| |
| @article{delignattowards, |
| title={Towards a Provably Secure Implementation of TLS 1.3}, |
| author={Delignat, Benjamin Beurdouche Karthikeyan Bhargavan Antoine and Ishtiaq, Lavaud C{\'e}dric Fournet Samin and Swamy, Markulf Kohlweiss Jonathan Protzenko Nikhil and Zinzindohou{\'e}, Santiago Zanella-B{\'e}guelin Jean Karim} |
| } |
| |
| @article{bhargavan2016implementing, |
| title={Implementing and Proving the TLS 1.3 Record Layer}, |
| author={Bhargavan, Karthikeyan and Delignat-Lavaud, Antoine and Fournet, Cédric and Kohlweiss, Markulf and Pan, Jianyang and Protzenko, Jonathan and Rastogi, Aseem and Swamy, Nikhil and Zanella-Béguelin, Santiago and Zinzindohoué, Jean Karim}, |
| year={2016} |
| } |
| |
| @inproceedings{bhargavan2016proscript, |
| title={ProScript TLS: Building a TLS 1.3 Implementation with a Verifiable Protocol Model}, |
| author={Bhargavan, Karthikeyan and Kobeissi, Nadim and Blanchet, Bruno}, |
| booktitle={TRON Workshop-TLS 1.3, Ready Or Not}, |
| year={2016} |
| } |
| |
| @inproceedings{beurdouche2015messy, |
| title={A messy state of the union: Taming the composite state machines of TLS}, |
| author={Beurdouche, Benjamin and Bhargavan, Karthikeyan and Delignat-Lavaud, Antoine and Fournet, C{\'e}dric and Kohlweiss, Markulf and Pironti, Alfredo and Strub, Pierre-Yves and Zinzindohoue, Jean Karim}, |
| booktitle={Security and Privacy (SP), 2015 IEEE Symposium on}, |
| pages={535--552}, |
| year={2015}, |
| organization={IEEE} |
| } |
| |
| @inproceedings{somorovsky2016systematic, |
| title={Systematic fuzzing and testing of TLS libraries}, |
| author={Somorovsky, Juraj}, |
| booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, |
| pages={1492--1504}, |
| year={2016}, |
| organization={ACM} |
| } |
| |
| @book{cremers2006scyther, |
| title={Scyther: Semantics and verification of security protocols}, |
| author={Cremers, Casimier Joseph Franciscus}, |
| year={2006}, |
| publisher={Eindhoven University of Technology Eindhoven, Netherlands} |
| } |
| |
| @article{goubault2000method, |
| title={A method for automatic cryptographic protocol verification}, |
| author={Goubault-Larrecq, Jean}, |
| journal={Parallel and Distributed Processing}, |
| pages={977--984}, |
| year={2000}, |
| publisher={Springer} |
| } |
| |
| @techreport{bella2000inductive, |
| title={Inductive verification of cryptographic protocols}, |
| author={Bella, Giampaolo}, |
| year={2000}, |
| institution={University of Cambridge, Computer Laboratory} |
| } |
| |
| # Standards |
| |
| @techreport{kaufman2014internet, |
| title={Internet key exchange protocol version 2 (IKEv2)}, |
| author={Kaufman, Charlie and Hoffman, Paul and Nir, Yoav and Eronen, Parsi and Kivinen, T}, |
| year={2014} |
| } |
| |
| @incollection{paterson2016reactive, |
| title={Reactive and Proactive Standardisation of TLS}, |
| author={Paterson, Kenneth G and van der Merwe, Thyla}, |
| booktitle={Security Standardisation Research}, |
| pages={160--186}, |
| year={2016}, |
| publisher={Springer} |
| } |
| |
| # General, Measurement, etc. |
| |
| ### INCOMPLETE, financial crypto 2017 |
| @article{samarasinghe2017short, |
| title={Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers}, |
| author={Samarasinghe, Nayanamana and Mannan, Mohammad}, |
| year={2017} |
| } |
| |
| ### INCOMPLETE, financial crypto 2017 |
| @article{chothiabanker, |
| title={Why Banker Bob (still) Can’t Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps}, |
| author={Chothia, Tom and Garcia, Flavio D and Heppel, Chris and Stone, Chris McMahon} |
| } |
| |
| @phdthesis{levillain2016study, |
| title={A study of the TLS ecosystem}, |
| author={Levillain, Olivier}, |
| year={2016}, |
| school={Institut National des T{\'e}l{\'e}communications} |
| } |
| |
| @inproceedings{springall2016measuring, |
| title={Measuring the Security Harm of TLS Crypto Shortcuts}, |
| author={Springall, Drew and Durumeric, Zakir and Halderman, J Alex}, |
| booktitle={Proceedings of the 2016 ACM on Internet Measurement Conference}, |
| pages={33--47}, |
| year={2016}, |
| organization={ACM} |
| } |