Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Douglas Stebila
@article{DBLP:journals/iacr/Stebila24, author = {Douglas Stebila}, title = {Security analysis of the iMessage {PQ3} protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2024}, url = {https://eprint.iacr.org/2024/357}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Stebila24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ParkS23, author = {Sungmi Park and Douglas Stebila}, title = {The Future of Digital Investigation: Automated Legal Inference}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {84--90}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3223187}, doi = {10.1109/MSEC.2022.3223187}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ParkS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TiepeltES23, author = {Marcel Tiepelt and Edward Eaton and Douglas Stebila}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Making an Asymmetric {PAKE} Quantum-Annoying by Hiding Group Elements}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14344}, pages = {168--188}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50594-2\_9}, doi = {10.1007/978-3-031-50594-2\_9}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/TiepeltES23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/GoertzenS23, author = {Jason Goertzen and Douglas Stebila}, editor = {Thomas Johansson and Daniel Smith{-}Tone}, title = {Post-Quantum Signatures in {DNSSEC} via Request-Based Fragmentation}, booktitle = {Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14154}, pages = {535--564}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-40003-2\_20}, doi = {10.1007/978-3-031-40003-2\_20}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/GoertzenS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-05311, author = {Carlos Aguilar Melchor and Thomas Bailleux and Jason Goertzen and David Joseph and Douglas Stebila}, title = {TurboTLS: {TLS} connection establishment with 1 less round trip}, journal = {CoRR}, volume = {abs/2302.05311}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.05311}, doi = {10.48550/ARXIV.2302.05311}, eprinttype = {arXiv}, eprint = {2302.05311}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-05311.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomloGS23, author = {Chelsea Komlo and Ian Goldberg and Douglas Stebila}, title = {A Formal Treatment of Distributed Key Generation, and New Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2023}, url = {https://eprint.iacr.org/2023/292}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KomloGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TiepeltES23, author = {Marcel Tiepelt and Edward Eaton and Douglas Stebila}, title = {Making an Asymmetric {PAKE} Quantum-Annoying by Hiding Group Elements}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1513}, year = {2023}, url = {https://eprint.iacr.org/2023/1513}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TiepeltES23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/SchwenkS22, author = {J{\"{o}}rg Schwenk and Douglas Stebila}, title = {A reduction-based proof for authentication and session key security in three-party Kerberos}, journal = {Int. J. Appl. Cryptogr.}, volume = {4}, number = {2}, pages = {61--84}, year = {2022}, url = {https://doi.org/10.1504/IJACT.2022.10052385}, doi = {10.1504/IJACT.2022.10052385}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/SchwenkS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuneysuHLOSZ22, author = {Tim G{\"{u}}neysu and Philip W. Hodges and Georg Land and Mike Ounsworth and Douglas Stebila and Greg Zaverucha}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Proof-of-Possession for {KEM} Certificates using Verifiable Generation}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1337--1351}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560560}, doi = {10.1145/3548606.3560560}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuneysuHLOSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CeliHSW22, author = {Sof{\'{\i}}a Celi and Jonathan Hoyland and Douglas Stebila and Thom Wiggers}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {A Tale of Two Models: Formal Verification of {KEMTLS} via Tamarin}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13556}, pages = {63--83}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17143-7\_4}, doi = {10.1007/978-3-031-17143-7\_4}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CeliHSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KannwischerSSW22, author = {Matthias J. Kannwischer and Peter Schwabe and Douglas Stebila and Thom Wiggers}, title = {Improving Software Quality in Cryptography Standardization Projects}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022 - Workshops, Genoa, Italy, June 6-10, 2022}, pages = {19--30}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSPW55150.2022.00010}, doi = {10.1109/EUROSPW55150.2022.00010}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/KannwischerSSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrendelF0JS22, author = {Jacqueline Brendel and Rune Fiedler and Felix G{\"{u}}nther and Christian Janson and Douglas Stebila}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {3--34}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_1}, doi = {10.1007/978-3-030-97131-1\_1}, timestamp = {Thu, 10 Mar 2022 11:26:10 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BrendelF0JS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-14196, author = {Jason Goertzen and Douglas Stebila}, title = {Post-Quantum Signatures in {DNSSEC} via Request-Based Fragmentation}, journal = {CoRR}, volume = {abs/2211.14196}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.14196}, doi = {10.48550/ARXIV.2211.14196}, eprinttype = {arXiv}, eprint = {2211.14196}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-14196.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KannwischerSSW22, author = {Matthias J. Kannwischer and Peter Schwabe and Douglas Stebila and Thom Wiggers}, title = {Improving Software Quality in Cryptography Standardization Projects}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2022}, url = {https://eprint.iacr.org/2022/337}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KannwischerSSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuneysuHLOSZ22, author = {Tim G{\"{u}}neysu and Philip W. Hodges and Georg Land and Mike Ounsworth and Douglas Stebila and Greg Zaverucha}, title = {Proof-of-possession for {KEM} certificates using verifiable generation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {703}, year = {2022}, url = {https://eprint.iacr.org/2022/703}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuneysuHLOSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CeliHSW22, author = {Sof{\'{\i}}a Celi and Jonathan Hoyland and Douglas Stebila and Thom Wiggers}, title = {A tale of two models: formal verification of {KEMTLS} via Tamarin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1111}, year = {2022}, url = {https://eprint.iacr.org/2022/1111}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CeliHSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BoyenHMS21, author = {Xavier Boyen and Udyani Herath and Matthew McKague and Douglas Stebila}, title = {Associative Blockchain for Decentralized {PKI} Transparency}, journal = {Cryptogr.}, volume = {5}, number = {2}, pages = {14}, year = {2021}, url = {https://doi.org/10.3390/cryptography5020014}, doi = {10.3390/CRYPTOGRAPHY5020014}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BoyenHMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MenezesS21, author = {Alfred Menezes and Douglas Stebila}, title = {Challenges in Cryptography}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {70--73}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3049730}, doi = {10.1109/MSEC.2021.3049730}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MenezesS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MenezesS21a, author = {Alfred Menezes and Douglas Stebila}, title = {End-to-End Security: When Do We Have It?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {60--64}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3077403}, doi = {10.1109/MSEC.2021.3077403}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MenezesS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MenezesS21b, author = {Alfred Menezes and Douglas Stebila}, title = {The Advanced Encryption Standard: 20 Years Later}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {98--102}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3107078}, doi = {10.1109/MSEC.2021.3107078}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MenezesS21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DowlingFGS21, author = {Benjamin Dowling and Marc Fischlin and Felix G{\"{u}}nther and Douglas Stebila}, title = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol}, journal = {J. Cryptol.}, volume = {34}, number = {4}, pages = {37}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09384-1}, doi = {10.1007/S00145-021-09384-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DowlingFGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HodgesS21, author = {Philip W. Hodges and Douglas Stebila}, title = {Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {389--422}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.389-422}, doi = {10.46586/TOSC.V2021.I2.389-422}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/HodgesS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PoetteringRSS21, author = {Bertram Poettering and Paul R{\"{o}}sler and J{\"{o}}rg Schwenk and Douglas Stebila}, editor = {Kenneth G. Paterson}, title = {SoK: Game-Based Security Models for Group Key Exchange}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {148--176}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_7}, doi = {10.1007/978-3-030-75539-3\_7}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PoetteringRSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SchwabeSW21, author = {Peter Schwabe and Douglas Stebila and Thom Wiggers}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {More Efficient Post-quantum {KEMTLS} with Pre-distributed Public Keys}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {3--22}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_1}, doi = {10.1007/978-3-030-88418-5\_1}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SchwabeSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/EatonSS21, author = {Edward Eaton and Douglas Stebila and Roy Stracovsky}, editor = {Patrick Longa and Carla R{\`{a}}fols}, title = {Post-quantum Key-Blinding for Authentication in Anonymity Networks}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogot{\'{a}}, Colombia, October 6-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12912}, pages = {67--87}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88238-9\_4}, doi = {10.1007/978-3-030-88238-9\_4}, timestamp = {Tue, 05 Oct 2021 11:19:16 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/EatonSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/BindelSV21, author = {Nina Bindel and Douglas Stebila and Shannon Veitch}, editor = {Patrick Longa and Carla R{\`{a}}fols}, title = {Improved Attacks Against Key Reuse in Learning with Errors Key Exchange}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogot{\'{a}}, Colombia, October 6-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12912}, pages = {168--188}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88238-9\_9}, doi = {10.1007/978-3-030-88238-9\_9}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/BindelSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/EatonS21, author = {Edward Eaton and Douglas Stebila}, editor = {Jung Hee Cheon and Jean{-}Pierre Tillich}, title = {The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols}, booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12841}, pages = {154--173}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81293-5\_9}, doi = {10.1007/978-3-030-81293-5\_9}, timestamp = {Wed, 21 Jul 2021 15:51:05 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/EatonS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoetteringRSS21, author = {Bertram Poettering and Paul R{\"{o}}sler and J{\"{o}}rg Schwenk and Douglas Stebila}, title = {SoK: Game-based Security Models for Group Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2021}, url = {https://eprint.iacr.org/2021/305}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoetteringRSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EatonS21, author = {Edward Eaton and Douglas Stebila}, title = {The "quantum annoying" property of password-authenticated key exchange protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {696}, year = {2021}, url = {https://eprint.iacr.org/2021/696}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EatonS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrendelFGJS21, author = {Jacqueline Brendel and Rune Fiedler and Felix G{\"{u}}nther and Christian Janson and Douglas Stebila}, title = {Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {769}, year = {2021}, url = {https://eprint.iacr.org/2021/769}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrendelFGJS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchwabeSW21, author = {Peter Schwabe and Douglas Stebila and Thom Wiggers}, title = {More efficient post-quantum {KEMTLS} with pre-distributed public keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {779}, year = {2021}, url = {https://eprint.iacr.org/2021/779}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchwabeSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EatonSS21, author = {Edward Eaton and Douglas Stebila and Roy Stracovsky}, title = {Post-Quantum Key-Blinding for Authentication in Anonymity Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {963}, year = {2021}, url = {https://eprint.iacr.org/2021/963}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EatonSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/BoydMS20, author = {Colin Boyd and Anish Mathuria and Douglas Stebila}, title = {Protocols for Authentication and Key Establishment, Second Edition}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-662-58146-9}, doi = {10.1007/978-3-662-58146-9}, isbn = {978-3-662-58145-2}, timestamp = {Fri, 08 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/BoydMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Cohn-GordonCDGS20, author = {Katriel Cohn{-}Gordon and Cas Cremers and Benjamin Dowling and Luke Garratt and Douglas Stebila}, title = {A Formal Security Analysis of the Signal Messaging Protocol}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {1914--1983}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09360-1}, doi = {10.1007/S00145-020-09360-1}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Cohn-GordonCDGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/KrastnikovKS20, author = {Simeon Krastnikov and Florian Kerschbaum and Douglas Stebila}, title = {Efficient Oblivious Database Joins}, journal = {Proc. {VLDB} Endow.}, volume = {13}, number = {11}, pages = {2132--2145}, year = {2020}, url = {http://www.vldb.org/pvldb/vol13/p2132-krastnikov.pdf}, timestamp = {Mon, 17 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/KrastnikovKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchwabeSW20, author = {Peter Schwabe and Douglas Stebila and Thom Wiggers}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Post-Quantum {TLS} Without Handshake Signatures}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1461--1480}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3423350}, doi = {10.1145/3372297.3423350}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SchwabeSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SabrySS20, author = {Moe Sabry and Reza Samavi and Douglas Stebila}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2020 International Workshops, {DPM} 2020 and {CBT} 2020, Guildford, UK, September 17-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12484}, pages = {89--107}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66172-4\_6}, doi = {10.1007/978-3-030-66172-4\_6}, timestamp = {Tue, 12 Jan 2021 14:44:40 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SabrySS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/PaquinST20, author = {Christian Paquin and Douglas Stebila and Goutam Tamvada}, editor = {Jintai Ding and Jean{-}Pierre Tillich}, title = {Benchmarking Post-quantum Cryptography in {TLS}}, booktitle = {Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12100}, pages = {72--91}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44223-1\_5}, doi = {10.1007/978-3-030-44223-1\_5}, timestamp = {Wed, 15 Apr 2020 17:34:50 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/PaquinST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BrendelFGJS20, author = {Jacqueline Brendel and Marc Fischlin and Felix G{\"{u}}nther and Christian Janson and Douglas Stebila}, editor = {Orr Dunkelman and Michael J. Jacobson Jr. and Colin O'Flynn}, title = {Towards Post-Quantum Security for Signal's {X3DH} Handshake}, booktitle = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12804}, pages = {404--430}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-81652-0\_16}, doi = {10.1007/978-3-030-81652-0\_16}, timestamp = {Thu, 22 Jul 2021 18:58:14 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BrendelFGJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2019, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38471-5}, doi = {10.1007/978-3-030-38471-5}, isbn = {978-3-030-38470-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-09481, author = {Simeon Krastnikov and Florian Kerschbaum and Douglas Stebila}, title = {Efficient Oblivious Database Joins}, journal = {CoRR}, volume = {abs/2003.09481}, year = {2020}, url = {https://arxiv.org/abs/2003.09481}, eprinttype = {arXiv}, eprint = {2003.09481}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-09481.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-00086, author = {Moe Sabry and Reza Samavi and Douglas Stebila}, title = {ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work}, journal = {CoRR}, volume = {abs/2009.00086}, year = {2020}, url = {https://arxiv.org/abs/2009.00086}, eprinttype = {arXiv}, eprint = {2009.00086}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-00086.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchwabeSW20, author = {Peter Schwabe and Douglas Stebila and Thom Wiggers}, title = {Post-quantum {TLS} without handshake signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2020}, url = {https://eprint.iacr.org/2020/534}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchwabeSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingFGS20, author = {Benjamin Dowling and Marc Fischlin and Felix G{\"{u}}nther and Douglas Stebila}, title = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1044}, year = {2020}, url = {https://eprint.iacr.org/2020/1044}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingFGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BindelSV20, author = {Nina Bindel and Douglas Stebila and Shannon Veitch}, title = {Improved attacks against key reuse in learning with errors key exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1288}, year = {2020}, url = {https://eprint.iacr.org/2020/1288}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BindelSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/BindelBFGS19, author = {Nina Bindel and Jacqueline Brendel and Marc Fischlin and Brian Goncalves and Douglas Stebila}, editor = {Jintai Ding and Rainer Steinwandt}, title = {Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange}, booktitle = {Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11505}, pages = {206--226}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25510-7\_12}, doi = {10.1007/978-3-030-25510-7\_12}, timestamp = {Mon, 15 Jul 2019 14:30:19 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BindelBFGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchwenkS19, author = {J{\"{o}}rg Schwenk and Douglas Stebila}, title = {A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {777}, year = {2019}, url = {https://eprint.iacr.org/2019/777}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchwenkS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrockettPS19, author = {Eric Crockett and Christian Paquin and Douglas Stebila}, title = {Prototyping post-quantum and hybrid key exchange and authentication in {TLS} and {SSH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {858}, year = {2019}, url = {https://eprint.iacr.org/2019/858}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CrockettPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrendelF0JS19, author = {Jacqueline Brendel and Marc Fischlin and Felix G{\"{u}}nther and Christian Janson and Douglas Stebila}, title = {Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1356}, year = {2019}, url = {https://eprint.iacr.org/2019/1356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrendelF0JS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaquinST19, author = {Christian Paquin and Douglas Stebila and Goutam Tamvada}, title = {Benchmarking Post-Quantum Cryptography in {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1447}, year = {2019}, url = {https://eprint.iacr.org/2019/1447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaquinST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BindelBFGS18, author = {Nina Bindel and Jacqueline Brendel and Marc Fischlin and Brian Goncalves and Douglas Stebila}, title = {Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {903}, year = {2018}, url = {https://eprint.iacr.org/2018/903}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BindelBFGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/PoetteringS17, author = {Bertram Poettering and Douglas Stebila}, title = {Double-authentication-preventing signatures}, journal = {Int. J. Inf. Sec.}, volume = {16}, number = {1}, pages = {1--22}, year = {2017}, url = {https://doi.org/10.1007/s10207-015-0307-8}, doi = {10.1007/S10207-015-0307-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/PoetteringS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BoydCFPPS17, author = {Colin Boyd and Cas Cremers and Mich{\`{e}}le Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila}, title = {{ASICS:} authenticated key exchange security incorporating certification systems}, journal = {Int. J. Inf. Sec.}, volume = {16}, number = {2}, pages = {151--171}, year = {2017}, url = {https://doi.org/10.1007/s10207-015-0312-y}, doi = {10.1007/S10207-015-0312-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BoydCFPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/GauravaramHS17, author = {Praveen Gauravaram and Shoichi Hirose and Douglas Stebila}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Security Analysis of a Design Variant of Randomized Hashing}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {14--22}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_2}, doi = {10.1007/978-981-10-5421-1\_2}, timestamp = {Mon, 26 Jun 2023 20:45:03 +0200}, biburl = {https://dblp.org/rec/conf/atis/GauravaramHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/Cohn-GordonCDGS17, author = {Katriel Cohn{-}Gordon and Cas Cremers and Benjamin Dowling and Luke Garratt and Douglas Stebila}, title = {A Formal Security Analysis of the Signal Messaging Protocol}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {451--466}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.27}, doi = {10.1109/EUROSP.2017.27}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/Cohn-GordonCDGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BellarePS17, author = {Mihir Bellare and Bertram Poettering and Douglas Stebila}, editor = {Serge Fehr}, title = {Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {121--151}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_5}, doi = {10.1007/978-3-662-54388-7\_5}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BellarePS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/BindelHMS17, author = {Nina Bindel and Udyani Herath and Matthew McKague and Douglas Stebila}, editor = {Tanja Lange and Tsuyoshi Takagi}, title = {Transitioning to a Quantum-Resistant Public Key Infrastructure}, booktitle = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10346}, pages = {384--405}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59879-6\_22}, doi = {10.1007/978-3-319-59879-6\_22}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BindelHMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BindelHMS17, author = {Nina Bindel and Udyani Herath and Matthew McKague and Douglas Stebila}, title = {Transitioning to a Quantum-Resistant Public Key Infrastructure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2017}, url = {http://eprint.iacr.org/2017/460}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BindelHMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ManulisSKD16, author = {Mark Manulis and Douglas Stebila and Franziskus Kiefer and Nick Denham}, title = {Secure modular password authentication for the web using channel bindings}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {6}, pages = {597--620}, year = {2016}, url = {https://doi.org/10.1007/s10207-016-0348-7}, doi = {10.1007/S10207-016-0348-7}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ManulisSKD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsc/MoghimifarS16, author = {Farhad Moghimifar and Douglas Stebila}, title = {Predicting {TLS} performance from key exchange performance: short paper}, booktitle = {Proceedings of the Australasian Computer Science Week Multiconference, Canberra, Australia, February 2-5, 2016}, pages = {44}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2843043.2843360}, doi = {10.1145/2843043.2843360}, timestamp = {Mon, 26 Nov 2018 12:14:45 +0100}, biburl = {https://dblp.org/rec/conf/acsc/MoghimifarS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BellarePS16, author = {Mihir Bellare and Bertram Poettering and Douglas Stebila}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {From Identification to Signatures, Tightly: {A} Framework and Generic Transforms}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {435--464}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_15}, doi = {10.1007/978-3-662-53890-6\_15}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BellarePS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BosCDMNNRS16, author = {Joppe W. Bos and Craig Costello and L{\'{e}}o Ducas and Ilya Mironov and Michael Naehrig and Valeria Nikolaenko and Ananth Raghunathan and Douglas Stebila}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from {LWE}}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1006--1018}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978425}, doi = {10.1145/2976749.2978425}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BosCDMNNRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BoydHMS16, author = {Colin Boyd and Britta Hale and Stig Frode Mj{\o}lsnes and Douglas Stebila}, editor = {Kazue Sako}, title = {From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to {TLS}}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {55--71}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_4}, doi = {10.1007/978-3-319-29485-8\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BoydHMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DowlingGHS16, author = {Benjamin Dowling and Felix G{\"{u}}nther and Udyani Herath and Douglas Stebila}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Secure Logging Schemes and Certificate Transparency}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9879}, pages = {140--158}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45741-3\_8}, doi = {10.1007/978-3-319-45741-3\_8}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DowlingGHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrzuskaJS16, author = {Christina Brzuska and H{\aa}kon Jacobsen and Douglas Stebila}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Safely Exporting Keys from Secure Channels - On the Security of {EAP-TLS} and {TLS} Key Exporters}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {670--698}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_26}, doi = {10.1007/978-3-662-49890-3\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrzuskaJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/StebilaM16, author = {Douglas Stebila and Michele Mosca}, editor = {Roberto Avanzi and Howard M. Heys}, title = {Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project}, booktitle = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10532}, pages = {14--37}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-69453-5\_2}, doi = {10.1007/978-3-319-69453-5\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/StebilaM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DowlingSZ16, author = {Benjamin Dowling and Douglas Stebila and Greg Zaverucha}, editor = {Thorsten Holz and Stefan Savage}, title = {Authenticated Network Time Synchronization}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {823--840}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/dowling}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/DowlingSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingFGS16, author = {Benjamin Dowling and Marc Fischlin and Felix G{\"{u}}nther and Douglas Stebila}, title = {A Cryptographic Analysis of the {TLS} 1.3 draft-10 Full and Pre-shared Key Handshake Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2016}, url = {http://eprint.iacr.org/2016/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingFGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaJS16, author = {Christina Brzuska and H{\aa}kon Jacobsen and Douglas Stebila}, title = {Safely Exporting Keys from Secure Channels: On the security of {EAP-TLS} and {TLS} Key Exporters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2016}, url = {http://eprint.iacr.org/2016/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingGHS16, author = {Benjamin Dowling and Felix G{\"{u}}nther and Udyani Herath and Douglas Stebila}, title = {Secure Logging Schemes and Certificate Transparency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2016}, url = {http://eprint.iacr.org/2016/452}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingGHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCDMNNRS16, author = {Joppe W. Bos and Craig Costello and L{\'{e}}o Ducas and Ilya Mironov and Michael Naehrig and Valeria Nikolaenko and Ananth Raghunathan and Douglas Stebila}, title = {Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {659}, year = {2016}, url = {http://eprint.iacr.org/2016/659}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosCDMNNRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cohn-GordonCDGS16, author = {Katriel Cohn{-}Gordon and Cas Cremers and Benjamin Dowling and Luke Garratt and Douglas Stebila}, title = {A Formal Security Analysis of the Signal Messaging Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1013}, year = {2016}, url = {http://eprint.iacr.org/2016/1013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cohn-GordonCDGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellarePS16, author = {Mihir Bellare and Bertram Poettering and Douglas Stebila}, title = {Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1016}, year = {2016}, url = {http://eprint.iacr.org/2016/1016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellarePS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StebilaM16, author = {Douglas Stebila and Michele Mosca}, title = {Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1017}, year = {2016}, url = {http://eprint.iacr.org/2016/1017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StebilaM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DowlingS15, author = {Benjamin Dowling and Douglas Stebila}, editor = {Ernest Foo and Douglas Stebila}, title = {Modelling Ciphersuite and Version Negotiation in the {TLS} Protocol}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {270--288}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_16}, doi = {10.1007/978-3-319-19962-7\_16}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DowlingS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DowlingFGS15, author = {Benjamin Dowling and Marc Fischlin and Felix G{\"{u}}nther and Douglas Stebila}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol Candidates}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1197--1210}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813653}, doi = {10.1145/2810103.2813653}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DowlingFGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AlawatugodaSB15, author = {Janaka Alawatugoda and Douglas Stebila and Colin Boyd}, editor = {Rainer B{\"{o}}hme and Tatsuaki Okamoto}, title = {Protecting Encrypted Cookies from Compression Side-Channel Attacks}, booktitle = {Financial Cryptography and Data Security - 19th International Conference, {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8975}, pages = {86--106}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47854-7\_6}, doi = {10.1007/978-3-662-47854-7\_6}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/AlawatugodaSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GutoskiS15, author = {Gus Gutoski and Douglas Stebila}, editor = {Rainer B{\"{o}}hme and Tatsuaki Okamoto}, title = {Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage}, booktitle = {Financial Cryptography and Data Security - 19th International Conference, {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8975}, pages = {497--504}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47854-7\_31}, doi = {10.1007/978-3-662-47854-7\_31}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GutoskiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/AlawatugodaSB15, author = {Janaka Alawatugoda and Douglas Stebila and Colin Boyd}, editor = {Jens Groth}, title = {Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange}, booktitle = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC} 2015, Oxford, UK, December 15-17, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9496}, pages = {277--294}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27239-9\_17}, doi = {10.1007/978-3-319-27239-9\_17}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/AlawatugodaSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BosCNS15, author = {Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila}, title = {Post-Quantum Key Exchange for the {TLS} Protocol from the Ring Learning with Errors Problem}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {553--570}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.40}, doi = {10.1109/SP.2015.40}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BosCNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/StebilaS15, author = {Douglas Stebila and Nick Sullivan}, title = {An Analysis of {TLS} Handshake Proxying}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {279--286}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.385}, doi = {10.1109/TRUSTCOM.2015.385}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/StebilaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2015, editor = {Ernest Foo and Douglas Stebila}, title = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7}, doi = {10.1007/978-3-319-19962-7}, isbn = {978-3-319-19961-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingSZ15, author = {Benjamin Dowling and Douglas Stebila and Greg Zaverucha}, title = {Authenticated Network Time Synchronization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2015}, url = {http://eprint.iacr.org/2015/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlawatugodaBS15, author = {Janaka Alawatugoda and Colin Boyd and Douglas Stebila}, title = {Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2015}, url = {http://eprint.iacr.org/2015/335}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlawatugodaBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingS15, author = {Benjamin Dowling and Douglas Stebila}, title = {Modelling ciphersuite and version negotiation in the {TLS} protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {652}, year = {2015}, url = {http://eprint.iacr.org/2015/652}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingFGS15, author = {Benjamin Dowling and Marc Fischlin and Felix G{\"{u}}nther and Douglas Stebila}, title = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {914}, year = {2015}, url = {http://eprint.iacr.org/2015/914}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingFGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydHMS15, author = {Colin Boyd and Britta Hale and Stig Frode Mj{\o}lsnes and Douglas Stebila}, title = {From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1150}, year = {2015}, url = {http://eprint.iacr.org/2015/1150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydHMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareS15a, author = {Mihir Bellare and Douglas Stebila}, title = {Double-Authentication-Preventing Signatures from Trapdoor Identification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1157}, year = {2015}, url = {http://eprint.iacr.org/2015/1157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ManulisPS14, author = {Mark Manulis and Bertram Poettering and Douglas Stebila}, title = {Plaintext awareness in identity-based key encapsulation}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {1}, pages = {25--49}, year = {2014}, url = {https://doi.org/10.1007/s10207-013-0218-5}, doi = {10.1007/S10207-013-0218-5}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ManulisPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AlawatugodaBS14, author = {Janaka Alawatugoda and Colin Boyd and Douglas Stebila}, editor = {Willy Susilo and Yi Mu}, title = {Continuous After-the-Fact Leakage-Resilient Key Exchange}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {258--273}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_17}, doi = {10.1007/978-3-319-08344-5\_17}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/AlawatugodaBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/RadkeBNMS14, author = {Kenneth Radke and Colin Boyd and Juanma Gonz{\'{a}}lez Nieto and Mark Manulis and Douglas Stebila}, editor = {Udaya Parampalli and Ian Welch}, title = {Formalising Human Recognition: a Fundamental Building Block for Security Proofs}, booktitle = {Twelfth Australasian Information Security Conference, {AISC} 2014, Auckland, New Zealand, January 2014}, series = {{CRPIT}}, volume = {149}, pages = {37--45}, publisher = {Australian Computer Society}, year = {2014}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Radke.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/RadkeBNMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlawatugodaSB14, author = {Janaka Alawatugoda and Douglas Stebila and Colin Boyd}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Modelling after-the-fact leakage for key exchange}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {207--216}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590317}, doi = {10.1145/2590296.2590317}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlawatugodaSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BergsmaDKSS14, author = {Florian Bergsma and Benjamin Dowling and Florian Kohlar and J{\"{o}}rg Schwenk and Douglas Stebila}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Multi-Ciphersuite Security of the Secure Shell {(SSH)} Protocol}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {369--381}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660286}, doi = {10.1145/2660267.2660286}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BergsmaDKSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PoetteringS14, author = {Bertram Poettering and Douglas Stebila}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Double-Authentication-Preventing Signatures}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {436--453}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_25}, doi = {10.1007/978-3-319-11203-9\_25}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/PoetteringS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/ManulisSD14, author = {Mark Manulis and Douglas Stebila and Nick Denham}, editor = {Liqun Chen and Chris J. Mitchell}, title = {Secure Modular Password Authentication for the Web Using Channel Bindings}, booktitle = {Security Standardisation Research - First International Conference, {SSR} 2014, London, UK, December 16-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8893}, pages = {167--189}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14054-4\_11}, doi = {10.1007/978-3-319-14054-4\_11}, timestamp = {Sat, 09 Apr 2022 12:41:37 +0200}, biburl = {https://dblp.org/rec/conf/secsr/ManulisSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlawatugodaSB14, author = {Janaka Alawatugoda and Douglas Stebila and Colin Boyd}, title = {Modelling After-the-fact Leakage for Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2014}, url = {http://eprint.iacr.org/2014/131}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlawatugodaSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlawatugodaBS14, author = {Janaka Alawatugoda and Colin Boyd and Douglas Stebila}, title = {Continuous After-the-fact Leakage-Resilient Key Exchange (full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2014}, url = {http://eprint.iacr.org/2014/264}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlawatugodaBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCNS14, author = {Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila}, title = {Post-quantum key exchange for the {TLS} protocol from the ring learning with errors problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2014}, url = {http://eprint.iacr.org/2014/599}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosCNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlawatugodaSB14a, author = {Janaka Alawatugoda and Douglas Stebila and Colin Boyd}, title = {Protecting Encrypted Cookies from Compression Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {724}, year = {2014}, url = {http://eprint.iacr.org/2014/724}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlawatugodaSB14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisSD14, author = {Mark Manulis and Douglas Stebila and Nick Denham}, title = {Secure modular password authentication for the web using channel bindings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {731}, year = {2014}, url = {http://eprint.iacr.org/2014/731}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GutoskiS14, author = {Gus Gutoski and Douglas Stebila}, title = {Hierarchical deterministic Bitcoin wallets that tolerate key leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {998}, year = {2014}, url = {http://eprint.iacr.org/2014/998}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GutoskiS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GoldbergSU13, author = {Ian Goldberg and Douglas Stebila and Berkant Ustaoglu}, title = {Anonymity and one-way authentication in key exchange protocols}, journal = {Des. Codes Cryptogr.}, volume = {67}, number = {2}, pages = {245--269}, year = {2013}, url = {https://doi.org/10.1007/s10623-011-9604-z}, doi = {10.1007/S10623-011-9604-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GoldbergSU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/NietoMPRS13, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, title = {Publicly verifiable ciphertexts}, journal = {J. Comput. Secur.}, volume = {21}, number = {5}, pages = {749--778}, year = {2013}, url = {https://doi.org/10.3233/JCS-130473}, doi = {10.3233/JCS-130473}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/NietoMPRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SouthS13, author = {Leah F. South and Douglas Stebila}, editor = {Colin Boyd and Leonie Simpson}, title = {Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {388--402}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_27}, doi = {10.1007/978-3-642-39059-3\_27}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SouthS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GiesenKS13, author = {Florian Giesen and Florian Kohlar and Douglas Stebila}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {On the security of {TLS} renegotiation}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {387--398}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516694}, doi = {10.1145/2508859.2516694}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GiesenKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ArianezhadCKS13, author = {Majid Arianezhad and L. Jean Camp and Timothy Kelley and Douglas Stebila}, editor = {Elisa Bertino and Ravi S. Sandhu and Lujo Bauer and Jaehong Park}, title = {Comparative eye tracking of experts and novices in web single sign-on}, booktitle = {Third {ACM} Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}, pages = {105--116}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435349.2435362}, doi = {10.1145/2435349.2435362}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ArianezhadCKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BroadbentGS13, author = {Anne Broadbent and Gus Gutoski and Douglas Stebila}, editor = {Ran Canetti and Juan A. Garay}, title = {Quantum One-Time Programs - (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {344--360}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_20}, doi = {10.1007/978-3-642-40084-1\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BroadbentGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BoydCFPPS13, author = {Colin Boyd and Cas Cremers and Mich{\`{e}}le Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {{ASICS:} Authenticated Key Exchange Security Incorporating Certification Systems}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {381--399}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_22}, doi = {10.1007/978-3-642-40203-6\_22}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BoydCFPPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ArianezhadSM13, author = {Majid Arianezhad and Douglas Stebila and Behzad Mozaffari}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Usability and Security of Gaze-Based Graphical Grid Passwords}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {17--33}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_2}, doi = {10.1007/978-3-642-41320-9\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ArianezhadSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/MoscaSU13, author = {Michele Mosca and Douglas Stebila and Berkant Ustaoglu}, editor = {Philippe Gaborit}, title = {Quantum Key Distribution in the Classical Authenticated Key Exchange Framework}, booktitle = {Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7932}, pages = {136--154}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38616-9\_9}, doi = {10.1007/978-3-642-38616-9\_9}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/MoscaSU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoetteringS13, author = {Bertram Poettering and Douglas Stebila}, title = {Double-authentication-preventing signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2013}, url = {http://eprint.iacr.org/2013/333}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoetteringS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BroadbentGS13, author = {Anne Broadbent and Gus Gutoski and Douglas Stebila}, title = {Quantum one-time programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2013}, url = {http://eprint.iacr.org/2013/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BroadbentGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydCFPPS13, author = {Colin Boyd and Cas Cremers and Mich{\`{e}}le Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila}, title = {{ASICS:} Authenticated Key Exchange Security Incorporating Certification Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {398}, year = {2013}, url = {http://eprint.iacr.org/2013/398}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydCFPPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingGKSS13, author = {Benjamin Dowling and Florian Giesen and Florian Kohlar and J{\"{o}}rg Schwenk and Douglas Stebila}, title = {Multi-ciphersuite security and the {SSH} protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {813}, year = {2013}, url = {http://eprint.iacr.org/2013/813}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingGKSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/RangasamySBNK12, author = {Jothi Rangasamy and Douglas Stebila and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Lakshmi Kuppusamy}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Effort-Release Public-Key Encryption from Cryptographic Puzzles}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {194--207}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_15}, doi = {10.1007/978-3-642-31448-3\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/RangasamySBNK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KuppusamyRSBN12, author = {Lakshmi Kuppusamy and Jothi Rangasamy and Douglas Stebila and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Heung Youl Youm and Yoojae Won}, title = {Practical client puzzles in the standard model}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {42--43}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414480}, doi = {10.1145/2414456.2414480}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KuppusamyRSBN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NietoMPRS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Publicly Verifiable Ciphertexts}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {393--410}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_22}, doi = {10.1007/978-3-642-32928-9\_22}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/NietoMPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/HassanzadehNS12, author = {Reza Hassanzadeh and Richi Nayak and Douglas Stebila}, editor = {Xiaoyang Sean Wang and Isabel F. Cruz and Alex Delis and Guangyan Huang}, title = {Analyzing the Effectiveness of Graph Metrics for Anomaly Detection in Online Social Networks}, booktitle = {Web Information Systems Engineering - {WISE} 2012 - 13th International Conference, Paphos, Cyprus, November 28-30, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7651}, pages = {624--630}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35063-4\_45}, doi = {10.1007/978-3-642-35063-4\_45}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wise/HassanzadehNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1211-1080, author = {Anne Broadbent and Gus Gutoski and Douglas Stebila}, title = {Quantum one-time programs}, journal = {CoRR}, volume = {abs/1211.1080}, year = {2012}, url = {http://arxiv.org/abs/1211.1080}, eprinttype = {arXiv}, eprint = {1211.1080}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1211-1080.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NietoMPRS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, title = {Publicly Verifiable Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2012}, url = {http://eprint.iacr.org/2012/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NietoMPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoscaSU12, author = {Michele Mosca and Douglas Stebila and Berkant Ustaoglu}, title = {Quantum Key Distribution in the Classical Authenticated Key Exchange Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2012}, url = {http://eprint.iacr.org/2012/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoscaSU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisPS12, author = {Mark Manulis and Bertram Poettering and Douglas Stebila}, title = {Plaintext Awareness in Identity-Based Key Encapsulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2012}, url = {http://eprint.iacr.org/2012/559}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiesenKS12, author = {Florian Giesen and Florian Kohlar and Douglas Stebila}, title = {On the Security of {TLS} Renegotiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2012}, url = {http://eprint.iacr.org/2012/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiesenKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RangasamySBN11, author = {Jothi Rangasamy and Douglas Stebila and Colin Boyd and Juanma Gonz{\'{a}}lez Nieto}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {An integrated approach to cryptographic mitigation of denial-of-service attacks}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {114--123}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966929}, doi = {10.1145/1966913.1966929}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RangasamySBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/StebilaKRBN11, author = {Douglas Stebila and Lakshmi Kuppusamy and Jothi Rangasamy and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Aggelos Kiayias}, title = {Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {284--301}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_19}, doi = {10.1007/978-3-642-19074-2\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/StebilaKRBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/RangasamySKBN11, author = {Jothi Rangasamy and Douglas Stebila and Lakshmi Kuppusamy and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Howon Kim}, title = {Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection}, booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7259}, pages = {319--331}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31912-9\_21}, doi = {10.1007/978-3-642-31912-9\_21}, timestamp = {Wed, 01 Mar 2023 16:53:12 +0100}, biburl = {https://dblp.org/rec/conf/icisc/RangasamySKBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/SuriadiSCL11, author = {Suriadi Suriadi and Douglas Stebila and Andrew J. Clark and Hua Liu}, title = {Defending Web Services against Denial of Service Attacks Using Client Puzzles}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2011, Washington, DC, USA, July 4-9, 2011}, pages = {25--32}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICWS.2011.22}, doi = {10.1109/ICWS.2011.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/SuriadiSCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/KuppusamyRSBN11, author = {Lakshmi Kuppusamy and Jothi Rangasamy and Douglas Stebila and Colin Boyd and Juanma Gonz{\'{a}}lez Nieto}, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {379--398}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_27}, doi = {10.1007/978-3-642-25578-6\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/KuppusamyRSBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RangasamySKBN11, author = {Jothi Rangasamy and Douglas Stebila and Lakshmi Kuppusamy and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2011}, url = {http://eprint.iacr.org/2011/665}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RangasamySKBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc6187, author = {Kevin M. Igoe and Douglas Stebila}, title = {X.509v3 Certificates for Secure Shell Authentication}, journal = {{RFC}}, volume = {6187}, pages = {1--16}, year = {2011}, url = {https://doi.org/10.17487/RFC6187}, doi = {10.17487/RFC6187}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc6187.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PatersonS10, author = {Kenneth G. Paterson and Douglas Stebila}, editor = {Ron Steinfeld and Philip Hawkes}, title = {One-Time-Password-Authenticated Key Exchange}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {264--281}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_17}, doi = {10.1007/978-3-642-14081-5\_17}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PatersonS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BirkettS10, author = {James Birkett and Douglas Stebila}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Predicate-Based Key Exchange}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {282--299}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_18}, doi = {10.1007/978-3-642-14081-5\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BirkettS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/StebilaUS10, author = {Douglas Stebila and Poornaprajna Udupi and Sheueling Chang Shantz}, editor = {Colin Boyd and Willy Susilo}, title = {Multi-Factor Password-Authenticated Key Exchange}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {56--66}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Stebila.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/StebilaUS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/CostelloS10, author = {Craig Costello and Douglas Stebila}, editor = {Michel Abdalla and Paulo S. L. M. Barreto}, title = {Fixed Argument Pairings}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6212}, pages = {92--108}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14712-8\_6}, doi = {10.1007/978-3-642-14712-8\_6}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/CostelloS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ozchi/Stebila10, author = {Douglas Stebila}, editor = {Margot Brereton and Stephen Viller and Ben Kraal}, title = {Reinforcing bad behaviour: the misuse of security indicators on popular websites}, booktitle = {Proceedings of the 22nd Australasian Computer-Human Interaction Conference, {OZCHI} 2010, Brisbane, Australia, November 22-26, 2010}, pages = {248--251}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1952222.1952275}, doi = {10.1145/1952222.1952275}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ozchi/Stebila10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BirkettS10, author = {James Birkett and Douglas Stebila}, title = {Predicate-Based Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2010}, url = {http://eprint.iacr.org/2010/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BirkettS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloS10, author = {Craig Costello and Douglas Stebila}, title = {Fixed Argument Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2010}, url = {http://eprint.iacr.org/2010/342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StebilaKRBN10, author = {Douglas Stebila and Lakshmi Kuppusamy and Jothi Rangasamy and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2010}, url = {http://eprint.iacr.org/2010/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StebilaKRBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Stebila09, author = {Douglas Stebila}, title = {Classical Authenticated Key Exchange and Quantum Cryptography}, school = {University of Waterloo, Ontario, Canada}, year = {2009}, url = {https://hdl.handle.net/10012/4295}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Stebila09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/StebilaU09, author = {Douglas Stebila and Berkant Ustaoglu}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Towards Denial-of-Service-Resilient Key Agreement Protocols}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {389--406}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_27}, doi = {10.1007/978-3-642-02620-1\_27}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/StebilaU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/quantumcomm/StebilaML09, author = {Douglas Stebila and Michele Mosca and Norbert L{\"{u}}tkenhaus}, editor = {Alexander V. Sergienko and Saverio Pascazio and Paolo Villoresi}, title = {The Case for Quantum Key Distribution}, booktitle = {Quantum Communication and Quantum Networking, First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {36}, pages = {283--296}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11731-2\_35}, doi = {10.1007/978-3-642-11731-2\_35}, timestamp = {Sun, 02 Jun 2019 21:10:58 +0200}, biburl = {https://dblp.org/rec/conf/quantumcomm/StebilaML09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StebilaML09, author = {Douglas Stebila and Michele Mosca and Norbert L{\"{u}}tkenhaus}, title = {The Case for Quantum Key Distribution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2009}, url = {http://eprint.iacr.org/2009/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StebilaML09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonS09, author = {Kenneth G. Paterson and Douglas Stebila}, title = {One-time-password-authenticated key exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2009}, url = {http://eprint.iacr.org/2009/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc5656, author = {Douglas Stebila and Jon Green}, title = {Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer}, journal = {{RFC}}, volume = {5656}, pages = {1--20}, year = {2009}, url = {https://doi.org/10.17487/RFC5656}, doi = {10.17487/RFC5656}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc5656.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StebilaUS08, author = {Douglas Stebila and Poornaprajna Udupi and Sheueling Chang Shantz}, title = {Multi-Factor Password-Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2008}, url = {http://eprint.iacr.org/2008/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StebilaUS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StebilaT06, author = {Douglas Stebila and Nicolas Th{\'{e}}riault}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Unified Point Addition Formul{\ae} and Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {354--368}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_28}, doi = {10.1007/11894063\_28}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/StebilaT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StebilaT05, author = {Douglas Stebila and Nicolas Th{\'{e}}riault}, title = {Unified Point Addition Formul{\ae} and Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2005}, url = {http://eprint.iacr.org/2005/419}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StebilaT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GuptaSFSGE04, author = {Vipul Gupta and Douglas Stebila and Stephen Fung and Sheueling Chang Shantz and Nils Gura and Hans Eberle}, title = {Speeding up Secure Web Transactions Using Elliptic Curve Cryptography}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2004, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2004}, url = {https://www.ndss-symposium.org/ndss2004/speeding-secure-web-transactions-using-elliptic-curve-cryptography/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GuptaSFSGE04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/GuptaSS04, author = {Vipul Gupta and Douglas Stebila and Sheueling Chang Shantz}, editor = {Stuart I. Feldman and Mike Uretsky and Marc Najork and Craig E. Wills}, title = {Integrating elliptic curve cryptography into the web's security infrastructure}, booktitle = {Proceedings of the 13th international conference on World Wide Web - Alternate Track Papers {\&} Posters, {WWW} 2004, New York, NY, USA, May 17-20, 2004}, pages = {402--403}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1013367.1013496}, doi = {10.1145/1013367.1013496}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/GuptaSS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeimerskirchSS03, author = {Andr{\'{e}} Weimerskirch and Douglas Stebila and Sheueling Chang Shantz}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Generic {GF(2)} Arithmetic in Software and Its Application to {ECC}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {79--92}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_8}, doi = {10.1007/3-540-45067-X\_8}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WeimerskirchSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuraSEGGFGS02, author = {Nils Gura and Sheueling Chang Shantz and Hans Eberle and Sumit Gupta and Vipul Gupta and Daniel F. Finchelstein and Edouard Goupy and Douglas Stebila}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {An End-to-End Systems Approach to Elliptic Curve Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {349--365}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_26}, doi = {10.1007/3-540-36400-5\_26}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GuraSEGGFGS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ws/GuptaGSS02, author = {Vipul Gupta and Sumit Gupta and Sheueling Chang Shantz and Douglas Stebila}, editor = {W. Douglas Maughan and Nitin H. Vaidya}, title = {Performance analysis of elliptic curve cryptography for {SSL}}, booktitle = {Proceedings of the 2002 {ACM} Workshop on Wireless Security, Atlanta, GA, USA, September 28, 2002}, pages = {87--94}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/570681.570691}, doi = {10.1145/570681.570691}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/GuptaGSS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.