BibTeX records: Douglas Stebila

download as .bib file

@article{DBLP:journals/iacr/Stebila24,
  author       = {Douglas Stebila},
  title        = {Security analysis of the iMessage {PQ3} protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/357},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Stebila24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ParkS23,
  author       = {Sungmi Park and
                  Douglas Stebila},
  title        = {The Future of Digital Investigation: Automated Legal Inference},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {1},
  pages        = {84--90},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3223187},
  doi          = {10.1109/MSEC.2022.3223187},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ParkS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TiepeltES23,
  author       = {Marcel Tiepelt and
                  Edward Eaton and
                  Douglas Stebila},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Making an Asymmetric {PAKE} Quantum-Annoying by Hiding Group Elements},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14344},
  pages        = {168--188},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50594-2\_9},
  doi          = {10.1007/978-3-031-50594-2\_9},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/TiepeltES23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/GoertzenS23,
  author       = {Jason Goertzen and
                  Douglas Stebila},
  editor       = {Thomas Johansson and
                  Daniel Smith{-}Tone},
  title        = {Post-Quantum Signatures in {DNSSEC} via Request-Based Fragmentation},
  booktitle    = {Post-Quantum Cryptography - 14th International Workshop, PQCrypto
                  2023, College Park, MD, USA, August 16-18, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14154},
  pages        = {535--564},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-40003-2\_20},
  doi          = {10.1007/978-3-031-40003-2\_20},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/GoertzenS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-05311,
  author       = {Carlos Aguilar Melchor and
                  Thomas Bailleux and
                  Jason Goertzen and
                  David Joseph and
                  Douglas Stebila},
  title        = {TurboTLS: {TLS} connection establishment with 1 less round trip},
  journal      = {CoRR},
  volume       = {abs/2302.05311},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.05311},
  doi          = {10.48550/ARXIV.2302.05311},
  eprinttype    = {arXiv},
  eprint       = {2302.05311},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-05311.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomloGS23,
  author       = {Chelsea Komlo and
                  Ian Goldberg and
                  Douglas Stebila},
  title        = {A Formal Treatment of Distributed Key Generation, and New Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/292},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KomloGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TiepeltES23,
  author       = {Marcel Tiepelt and
                  Edward Eaton and
                  Douglas Stebila},
  title        = {Making an Asymmetric {PAKE} Quantum-Annoying by Hiding Group Elements},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1513},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1513},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TiepeltES23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/SchwenkS22,
  author       = {J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  title        = {A reduction-based proof for authentication and session key security
                  in three-party Kerberos},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {61--84},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJACT.2022.10052385},
  doi          = {10.1504/IJACT.2022.10052385},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/SchwenkS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuneysuHLOSZ22,
  author       = {Tim G{\"{u}}neysu and
                  Philip W. Hodges and
                  Georg Land and
                  Mike Ounsworth and
                  Douglas Stebila and
                  Greg Zaverucha},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Proof-of-Possession for {KEM} Certificates using Verifiable Generation},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1337--1351},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560560},
  doi          = {10.1145/3548606.3560560},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuneysuHLOSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CeliHSW22,
  author       = {Sof{\'{\i}}a Celi and
                  Jonathan Hoyland and
                  Douglas Stebila and
                  Thom Wiggers},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {A Tale of Two Models: Formal Verification of {KEMTLS} via Tamarin},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13556},
  pages        = {63--83},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17143-7\_4},
  doi          = {10.1007/978-3-031-17143-7\_4},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/CeliHSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KannwischerSSW22,
  author       = {Matthias J. Kannwischer and
                  Peter Schwabe and
                  Douglas Stebila and
                  Thom Wiggers},
  title        = {Improving Software Quality in Cryptography Standardization Projects},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022 - Workshops, Genoa, Italy, June 6-10, 2022},
  pages        = {19--30},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSPW55150.2022.00010},
  doi          = {10.1109/EUROSPW55150.2022.00010},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/KannwischerSSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrendelF0JS22,
  author       = {Jacqueline Brendel and
                  Rune Fiedler and
                  Felix G{\"{u}}nther and
                  Christian Janson and
                  Douglas Stebila},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {3--34},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_1},
  doi          = {10.1007/978-3-030-97131-1\_1},
  timestamp    = {Thu, 10 Mar 2022 11:26:10 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BrendelF0JS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-14196,
  author       = {Jason Goertzen and
                  Douglas Stebila},
  title        = {Post-Quantum Signatures in {DNSSEC} via Request-Based Fragmentation},
  journal      = {CoRR},
  volume       = {abs/2211.14196},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.14196},
  doi          = {10.48550/ARXIV.2211.14196},
  eprinttype    = {arXiv},
  eprint       = {2211.14196},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-14196.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KannwischerSSW22,
  author       = {Matthias J. Kannwischer and
                  Peter Schwabe and
                  Douglas Stebila and
                  Thom Wiggers},
  title        = {Improving Software Quality in Cryptography Standardization Projects},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/337},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KannwischerSSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuneysuHLOSZ22,
  author       = {Tim G{\"{u}}neysu and
                  Philip W. Hodges and
                  Georg Land and
                  Mike Ounsworth and
                  Douglas Stebila and
                  Greg Zaverucha},
  title        = {Proof-of-possession for {KEM} certificates using verifiable generation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {703},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/703},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuneysuHLOSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CeliHSW22,
  author       = {Sof{\'{\i}}a Celi and
                  Jonathan Hoyland and
                  Douglas Stebila and
                  Thom Wiggers},
  title        = {A tale of two models: formal verification of {KEMTLS} via Tamarin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1111},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1111},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CeliHSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BoyenHMS21,
  author       = {Xavier Boyen and
                  Udyani Herath and
                  Matthew McKague and
                  Douglas Stebila},
  title        = {Associative Blockchain for Decentralized {PKI} Transparency},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {2},
  pages        = {14},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5020014},
  doi          = {10.3390/CRYPTOGRAPHY5020014},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BoyenHMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MenezesS21,
  author       = {Alfred Menezes and
                  Douglas Stebila},
  title        = {Challenges in Cryptography},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {70--73},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3049730},
  doi          = {10.1109/MSEC.2021.3049730},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MenezesS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MenezesS21a,
  author       = {Alfred Menezes and
                  Douglas Stebila},
  title        = {End-to-End Security: When Do We Have It?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {60--64},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3077403},
  doi          = {10.1109/MSEC.2021.3077403},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MenezesS21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MenezesS21b,
  author       = {Alfred Menezes and
                  Douglas Stebila},
  title        = {The Advanced Encryption Standard: 20 Years Later},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {98--102},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3107078},
  doi          = {10.1109/MSEC.2021.3107078},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MenezesS21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DowlingFGS21,
  author       = {Benjamin Dowling and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Douglas Stebila},
  title        = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {4},
  pages        = {37},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09384-1},
  doi          = {10.1007/S00145-021-09384-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DowlingFGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HodgesS21,
  author       = {Philip W. Hodges and
                  Douglas Stebila},
  title        = {Algorithm Substitution Attacks: State Reset Detection and Asymmetric
                  Modifications},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {389--422},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.389-422},
  doi          = {10.46586/TOSC.V2021.I2.389-422},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HodgesS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PoetteringRSS21,
  author       = {Bertram Poettering and
                  Paul R{\"{o}}sler and
                  J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  editor       = {Kenneth G. Paterson},
  title        = {SoK: Game-Based Security Models for Group Key Exchange},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {148--176},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_7},
  doi          = {10.1007/978-3-030-75539-3\_7},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PoetteringRSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SchwabeSW21,
  author       = {Peter Schwabe and
                  Douglas Stebila and
                  Thom Wiggers},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {More Efficient Post-quantum {KEMTLS} with Pre-distributed Public Keys},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_1},
  doi          = {10.1007/978-3-030-88418-5\_1},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SchwabeSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/EatonSS21,
  author       = {Edward Eaton and
                  Douglas Stebila and
                  Roy Stracovsky},
  editor       = {Patrick Longa and
                  Carla R{\`{a}}fols},
  title        = {Post-quantum Key-Blinding for Authentication in Anonymity Networks},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2021 - 7th International Conference
                  on Cryptology and Information Security in Latin America, Bogot{\'{a}},
                  Colombia, October 6-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12912},
  pages        = {67--87},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88238-9\_4},
  doi          = {10.1007/978-3-030-88238-9\_4},
  timestamp    = {Tue, 05 Oct 2021 11:19:16 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/EatonSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/BindelSV21,
  author       = {Nina Bindel and
                  Douglas Stebila and
                  Shannon Veitch},
  editor       = {Patrick Longa and
                  Carla R{\`{a}}fols},
  title        = {Improved Attacks Against Key Reuse in Learning with Errors Key Exchange},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2021 - 7th International Conference
                  on Cryptology and Information Security in Latin America, Bogot{\'{a}},
                  Colombia, October 6-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12912},
  pages        = {168--188},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88238-9\_9},
  doi          = {10.1007/978-3-030-88238-9\_9},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/BindelSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/EatonS21,
  author       = {Edward Eaton and
                  Douglas Stebila},
  editor       = {Jung Hee Cheon and
                  Jean{-}Pierre Tillich},
  title        = {The "Quantum Annoying" Property of Password-Authenticated
                  Key Exchange Protocols},
  booktitle    = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
                  2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12841},
  pages        = {154--173},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81293-5\_9},
  doi          = {10.1007/978-3-030-81293-5\_9},
  timestamp    = {Wed, 21 Jul 2021 15:51:05 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/EatonS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoetteringRSS21,
  author       = {Bertram Poettering and
                  Paul R{\"{o}}sler and
                  J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  title        = {SoK: Game-based Security Models for Group Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/305},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoetteringRSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EatonS21,
  author       = {Edward Eaton and
                  Douglas Stebila},
  title        = {The "quantum annoying" property of password-authenticated
                  key exchange protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {696},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/696},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EatonS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrendelFGJS21,
  author       = {Jacqueline Brendel and
                  Rune Fiedler and
                  Felix G{\"{u}}nther and
                  Christian Janson and
                  Douglas Stebila},
  title        = {Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {769},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/769},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrendelFGJS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchwabeSW21,
  author       = {Peter Schwabe and
                  Douglas Stebila and
                  Thom Wiggers},
  title        = {More efficient post-quantum {KEMTLS} with pre-distributed public keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {779},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/779},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchwabeSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EatonSS21,
  author       = {Edward Eaton and
                  Douglas Stebila and
                  Roy Stracovsky},
  title        = {Post-Quantum Key-Blinding for Authentication in Anonymity Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {963},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/963},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EatonSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/BoydMS20,
  author       = {Colin Boyd and
                  Anish Mathuria and
                  Douglas Stebila},
  title        = {Protocols for Authentication and Key Establishment, Second Edition},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-662-58146-9},
  doi          = {10.1007/978-3-662-58146-9},
  isbn         = {978-3-662-58145-2},
  timestamp    = {Fri, 08 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/BoydMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Cohn-GordonCDGS20,
  author       = {Katriel Cohn{-}Gordon and
                  Cas Cremers and
                  Benjamin Dowling and
                  Luke Garratt and
                  Douglas Stebila},
  title        = {A Formal Security Analysis of the Signal Messaging Protocol},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {1914--1983},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09360-1},
  doi          = {10.1007/S00145-020-09360-1},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Cohn-GordonCDGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/KrastnikovKS20,
  author       = {Simeon Krastnikov and
                  Florian Kerschbaum and
                  Douglas Stebila},
  title        = {Efficient Oblivious Database Joins},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {13},
  number       = {11},
  pages        = {2132--2145},
  year         = {2020},
  url          = {http://www.vldb.org/pvldb/vol13/p2132-krastnikov.pdf},
  timestamp    = {Mon, 17 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/KrastnikovKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchwabeSW20,
  author       = {Peter Schwabe and
                  Douglas Stebila and
                  Thom Wiggers},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Post-Quantum {TLS} Without Handshake Signatures},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1461--1480},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3423350},
  doi          = {10.1145/3372297.3423350},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SchwabeSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SabrySS20,
  author       = {Moe Sabry and
                  Reza Samavi and
                  Douglas Stebila},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2020 International Workshops, {DPM} 2020 and {CBT} 2020,
                  Guildford, UK, September 17-18, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12484},
  pages        = {89--107},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66172-4\_6},
  doi          = {10.1007/978-3-030-66172-4\_6},
  timestamp    = {Tue, 12 Jan 2021 14:44:40 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SabrySS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/PaquinST20,
  author       = {Christian Paquin and
                  Douglas Stebila and
                  Goutam Tamvada},
  editor       = {Jintai Ding and
                  Jean{-}Pierre Tillich},
  title        = {Benchmarking Post-quantum Cryptography in {TLS}},
  booktitle    = {Post-Quantum Cryptography - 11th International Conference, PQCrypto
                  2020, Paris, France, April 15-17, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12100},
  pages        = {72--91},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44223-1\_5},
  doi          = {10.1007/978-3-030-44223-1\_5},
  timestamp    = {Wed, 15 Apr 2020 17:34:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/PaquinST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BrendelFGJS20,
  author       = {Jacqueline Brendel and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Christian Janson and
                  Douglas Stebila},
  editor       = {Orr Dunkelman and
                  Michael J. Jacobson Jr. and
                  Colin O'Flynn},
  title        = {Towards Post-Quantum Security for Signal's {X3DH} Handshake},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference,
                  Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12804},
  pages        = {404--430},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-81652-0\_16},
  doi          = {10.1007/978-3-030-81652-0\_16},
  timestamp    = {Thu, 22 Jul 2021 18:58:14 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BrendelFGJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2019,
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38471-5},
  doi          = {10.1007/978-3-030-38471-5},
  isbn         = {978-3-030-38470-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-09481,
  author       = {Simeon Krastnikov and
                  Florian Kerschbaum and
                  Douglas Stebila},
  title        = {Efficient Oblivious Database Joins},
  journal      = {CoRR},
  volume       = {abs/2003.09481},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.09481},
  eprinttype    = {arXiv},
  eprint       = {2003.09481},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-09481.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-00086,
  author       = {Moe Sabry and
                  Reza Samavi and
                  Douglas Stebila},
  title        = {ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work},
  journal      = {CoRR},
  volume       = {abs/2009.00086},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.00086},
  eprinttype    = {arXiv},
  eprint       = {2009.00086},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-00086.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchwabeSW20,
  author       = {Peter Schwabe and
                  Douglas Stebila and
                  Thom Wiggers},
  title        = {Post-quantum {TLS} without handshake signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/534},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchwabeSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingFGS20,
  author       = {Benjamin Dowling and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Douglas Stebila},
  title        = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1044},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1044},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingFGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BindelSV20,
  author       = {Nina Bindel and
                  Douglas Stebila and
                  Shannon Veitch},
  title        = {Improved attacks against key reuse in learning with errors key exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1288},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1288},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BindelSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BindelBFGS19,
  author       = {Nina Bindel and
                  Jacqueline Brendel and
                  Marc Fischlin and
                  Brian Goncalves and
                  Douglas Stebila},
  editor       = {Jintai Ding and
                  Rainer Steinwandt},
  title        = {Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange},
  booktitle    = {Post-Quantum Cryptography - 10th International Conference, PQCrypto
                  2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11505},
  pages        = {206--226},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-25510-7\_12},
  doi          = {10.1007/978-3-030-25510-7\_12},
  timestamp    = {Mon, 15 Jul 2019 14:30:19 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BindelBFGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchwenkS19,
  author       = {J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  title        = {A Reduction-Based Proof for Authentication and Session Key Security
                  in 3-Party Kerberos},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {777},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/777},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchwenkS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrockettPS19,
  author       = {Eric Crockett and
                  Christian Paquin and
                  Douglas Stebila},
  title        = {Prototyping post-quantum and hybrid key exchange and authentication
                  in {TLS} and {SSH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {858},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/858},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CrockettPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrendelF0JS19,
  author       = {Jacqueline Brendel and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Christian Janson and
                  Douglas Stebila},
  title        = {Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation
                  Mechanisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1356},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrendelF0JS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaquinST19,
  author       = {Christian Paquin and
                  Douglas Stebila and
                  Goutam Tamvada},
  title        = {Benchmarking Post-Quantum Cryptography in {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1447},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaquinST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BindelBFGS18,
  author       = {Nina Bindel and
                  Jacqueline Brendel and
                  Marc Fischlin and
                  Brian Goncalves and
                  Douglas Stebila},
  title        = {Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {903},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/903},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BindelBFGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/PoetteringS17,
  author       = {Bertram Poettering and
                  Douglas Stebila},
  title        = {Double-authentication-preventing signatures},
  journal      = {Int. J. Inf. Sec.},
  volume       = {16},
  number       = {1},
  pages        = {1--22},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10207-015-0307-8},
  doi          = {10.1007/S10207-015-0307-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/PoetteringS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BoydCFPPS17,
  author       = {Colin Boyd and
                  Cas Cremers and
                  Mich{\`{e}}le Feltz and
                  Kenneth G. Paterson and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {{ASICS:} authenticated key exchange security incorporating certification
                  systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {16},
  number       = {2},
  pages        = {151--171},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10207-015-0312-y},
  doi          = {10.1007/S10207-015-0312-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BoydCFPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/GauravaramHS17,
  author       = {Praveen Gauravaram and
                  Shoichi Hirose and
                  Douglas Stebila},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Security Analysis of a Design Variant of Randomized Hashing},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {14--22},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_2},
  doi          = {10.1007/978-981-10-5421-1\_2},
  timestamp    = {Mon, 26 Jun 2023 20:45:03 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/GauravaramHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/Cohn-GordonCDGS17,
  author       = {Katriel Cohn{-}Gordon and
                  Cas Cremers and
                  Benjamin Dowling and
                  Luke Garratt and
                  Douglas Stebila},
  title        = {A Formal Security Analysis of the Signal Messaging Protocol},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {451--466},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.27},
  doi          = {10.1109/EUROSP.2017.27},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/Cohn-GordonCDGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BellarePS17,
  author       = {Mihir Bellare and
                  Bertram Poettering and
                  Douglas Stebila},
  editor       = {Serge Fehr},
  title        = {Deterring Certificate Subversion: Efficient Double-Authentication-Preventing
                  Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {121--151},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_5},
  doi          = {10.1007/978-3-662-54388-7\_5},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BellarePS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BindelHMS17,
  author       = {Nina Bindel and
                  Udyani Herath and
                  Matthew McKague and
                  Douglas Stebila},
  editor       = {Tanja Lange and
                  Tsuyoshi Takagi},
  title        = {Transitioning to a Quantum-Resistant Public Key Infrastructure},
  booktitle    = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017,
                  Utrecht, The Netherlands, June 26-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10346},
  pages        = {384--405},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59879-6\_22},
  doi          = {10.1007/978-3-319-59879-6\_22},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BindelHMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BindelHMS17,
  author       = {Nina Bindel and
                  Udyani Herath and
                  Matthew McKague and
                  Douglas Stebila},
  title        = {Transitioning to a Quantum-Resistant Public Key Infrastructure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/460},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BindelHMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ManulisSKD16,
  author       = {Mark Manulis and
                  Douglas Stebila and
                  Franziskus Kiefer and
                  Nick Denham},
  title        = {Secure modular password authentication for the web using channel bindings},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {6},
  pages        = {597--620},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-016-0348-7},
  doi          = {10.1007/S10207-016-0348-7},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ManulisSKD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsc/MoghimifarS16,
  author       = {Farhad Moghimifar and
                  Douglas Stebila},
  title        = {Predicting {TLS} performance from key exchange performance: short
                  paper},
  booktitle    = {Proceedings of the Australasian Computer Science Week Multiconference,
                  Canberra, Australia, February 2-5, 2016},
  pages        = {44},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2843043.2843360},
  doi          = {10.1145/2843043.2843360},
  timestamp    = {Mon, 26 Nov 2018 12:14:45 +0100},
  biburl       = {https://dblp.org/rec/conf/acsc/MoghimifarS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BellarePS16,
  author       = {Mihir Bellare and
                  Bertram Poettering and
                  Douglas Stebila},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {From Identification to Signatures, Tightly: {A} Framework and Generic
                  Transforms},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {435--464},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_15},
  doi          = {10.1007/978-3-662-53890-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BellarePS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BosCDMNNRS16,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  L{\'{e}}o Ducas and
                  Ilya Mironov and
                  Michael Naehrig and
                  Valeria Nikolaenko and
                  Ananth Raghunathan and
                  Douglas Stebila},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from
                  {LWE}},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1006--1018},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978425},
  doi          = {10.1145/2976749.2978425},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BosCDMNNRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BoydHMS16,
  author       = {Colin Boyd and
                  Britta Hale and
                  Stig Frode Mj{\o}lsnes and
                  Douglas Stebila},
  editor       = {Kazue Sako},
  title        = {From Stateless to Stateful: Generic Authentication and Authenticated
                  Encryption Constructions with Application to {TLS}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {55--71},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_4},
  doi          = {10.1007/978-3-319-29485-8\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BoydHMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DowlingGHS16,
  author       = {Benjamin Dowling and
                  Felix G{\"{u}}nther and
                  Udyani Herath and
                  Douglas Stebila},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Secure Logging Schemes and Certificate Transparency},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9879},
  pages        = {140--158},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45741-3\_8},
  doi          = {10.1007/978-3-319-45741-3\_8},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DowlingGHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BrzuskaJS16,
  author       = {Christina Brzuska and
                  H{\aa}kon Jacobsen and
                  Douglas Stebila},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Safely Exporting Keys from Secure Channels - On the Security of {EAP-TLS}
                  and {TLS} Key Exporters},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {670--698},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_26},
  doi          = {10.1007/978-3-662-49890-3\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BrzuskaJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/StebilaM16,
  author       = {Douglas Stebila and
                  Michele Mosca},
  editor       = {Roberto Avanzi and
                  Howard M. Heys},
  title        = {Post-quantum Key Exchange for the Internet and the Open Quantum Safe
                  Project},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference,
                  St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10532},
  pages        = {14--37},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-69453-5\_2},
  doi          = {10.1007/978-3-319-69453-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/StebilaM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DowlingSZ16,
  author       = {Benjamin Dowling and
                  Douglas Stebila and
                  Greg Zaverucha},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Authenticated Network Time Synchronization},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {823--840},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/dowling},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DowlingSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingFGS16,
  author       = {Benjamin Dowling and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Douglas Stebila},
  title        = {A Cryptographic Analysis of the {TLS} 1.3 draft-10 Full and Pre-shared
                  Key Handshake Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingFGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaJS16,
  author       = {Christina Brzuska and
                  H{\aa}kon Jacobsen and
                  Douglas Stebila},
  title        = {Safely Exporting Keys from Secure Channels: On the security of {EAP-TLS}
                  and {TLS} Key Exporters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingGHS16,
  author       = {Benjamin Dowling and
                  Felix G{\"{u}}nther and
                  Udyani Herath and
                  Douglas Stebila},
  title        = {Secure Logging Schemes and Certificate Transparency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingGHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCDMNNRS16,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  L{\'{e}}o Ducas and
                  Ilya Mironov and
                  Michael Naehrig and
                  Valeria Nikolaenko and
                  Ananth Raghunathan and
                  Douglas Stebila},
  title        = {Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from
                  {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {659},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/659},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCDMNNRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cohn-GordonCDGS16,
  author       = {Katriel Cohn{-}Gordon and
                  Cas Cremers and
                  Benjamin Dowling and
                  Luke Garratt and
                  Douglas Stebila},
  title        = {A Formal Security Analysis of the Signal Messaging Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1013},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cohn-GordonCDGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellarePS16,
  author       = {Mihir Bellare and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {Deterring Certificate Subversion: Efficient Double-Authentication-Preventing
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1016},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellarePS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StebilaM16,
  author       = {Douglas Stebila and
                  Michele Mosca},
  title        = {Post-Quantum Key Exchange for the Internet and the Open Quantum Safe
                  Project},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1017},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StebilaM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DowlingS15,
  author       = {Benjamin Dowling and
                  Douglas Stebila},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Modelling Ciphersuite and Version Negotiation in the {TLS} Protocol},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {270--288},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_16},
  doi          = {10.1007/978-3-319-19962-7\_16},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DowlingS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DowlingFGS15,
  author       = {Benjamin Dowling and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Douglas Stebila},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol Candidates},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1197--1210},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813653},
  doi          = {10.1145/2810103.2813653},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DowlingFGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AlawatugodaSB15,
  author       = {Janaka Alawatugoda and
                  Douglas Stebila and
                  Colin Boyd},
  editor       = {Rainer B{\"{o}}hme and
                  Tatsuaki Okamoto},
  title        = {Protecting Encrypted Cookies from Compression Side-Channel Attacks},
  booktitle    = {Financial Cryptography and Data Security - 19th International Conference,
                  {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8975},
  pages        = {86--106},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47854-7\_6},
  doi          = {10.1007/978-3-662-47854-7\_6},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/AlawatugodaSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GutoskiS15,
  author       = {Gus Gutoski and
                  Douglas Stebila},
  editor       = {Rainer B{\"{o}}hme and
                  Tatsuaki Okamoto},
  title        = {Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage},
  booktitle    = {Financial Cryptography and Data Security - 19th International Conference,
                  {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8975},
  pages        = {497--504},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47854-7\_31},
  doi          = {10.1007/978-3-662-47854-7\_31},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GutoskiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/AlawatugodaSB15,
  author       = {Janaka Alawatugoda and
                  Douglas Stebila and
                  Colin Boyd},
  editor       = {Jens Groth},
  title        = {Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {277--294},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_17},
  doi          = {10.1007/978-3-319-27239-9\_17},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/AlawatugodaSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BosCNS15,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  Michael Naehrig and
                  Douglas Stebila},
  title        = {Post-Quantum Key Exchange for the {TLS} Protocol from the Ring Learning
                  with Errors Problem},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {553--570},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.40},
  doi          = {10.1109/SP.2015.40},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BosCNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/StebilaS15,
  author       = {Douglas Stebila and
                  Nick Sullivan},
  title        = {An Analysis of {TLS} Handshake Proxying},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {279--286},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.385},
  doi          = {10.1109/TRUSTCOM.2015.385},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/StebilaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2015,
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7},
  doi          = {10.1007/978-3-319-19962-7},
  isbn         = {978-3-319-19961-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingSZ15,
  author       = {Benjamin Dowling and
                  Douglas Stebila and
                  Greg Zaverucha},
  title        = {Authenticated Network Time Synchronization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlawatugodaBS15,
  author       = {Janaka Alawatugoda and
                  Colin Boyd and
                  Douglas Stebila},
  title        = {Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {335},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/335},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlawatugodaBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingS15,
  author       = {Benjamin Dowling and
                  Douglas Stebila},
  title        = {Modelling ciphersuite and version negotiation in the {TLS} protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {652},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/652},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingFGS15,
  author       = {Benjamin Dowling and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Douglas Stebila},
  title        = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {914},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/914},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingFGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydHMS15,
  author       = {Colin Boyd and
                  Britta Hale and
                  Stig Frode Mj{\o}lsnes and
                  Douglas Stebila},
  title        = {From Stateless to Stateful: Generic Authentication and Authenticated
                  Encryption Constructions with Application to {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1150},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydHMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareS15a,
  author       = {Mihir Bellare and
                  Douglas Stebila},
  title        = {Double-Authentication-Preventing Signatures from Trapdoor Identification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1157},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ManulisPS14,
  author       = {Mark Manulis and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {Plaintext awareness in identity-based key encapsulation},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {1},
  pages        = {25--49},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-013-0218-5},
  doi          = {10.1007/S10207-013-0218-5},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ManulisPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AlawatugodaBS14,
  author       = {Janaka Alawatugoda and
                  Colin Boyd and
                  Douglas Stebila},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Continuous After-the-Fact Leakage-Resilient Key Exchange},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {258--273},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_17},
  doi          = {10.1007/978-3-319-08344-5\_17},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/AlawatugodaBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/RadkeBNMS14,
  author       = {Kenneth Radke and
                  Colin Boyd and
                  Juanma Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Douglas Stebila},
  editor       = {Udaya Parampalli and
                  Ian Welch},
  title        = {Formalising Human Recognition: a Fundamental Building Block for Security
                  Proofs},
  booktitle    = {Twelfth Australasian Information Security Conference, {AISC} 2014,
                  Auckland, New Zealand, January 2014},
  series       = {{CRPIT}},
  volume       = {149},
  pages        = {37--45},
  publisher    = {Australian Computer Society},
  year         = {2014},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Radke.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/RadkeBNMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlawatugodaSB14,
  author       = {Janaka Alawatugoda and
                  Douglas Stebila and
                  Colin Boyd},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Modelling after-the-fact leakage for key exchange},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {207--216},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590317},
  doi          = {10.1145/2590296.2590317},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AlawatugodaSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BergsmaDKSS14,
  author       = {Florian Bergsma and
                  Benjamin Dowling and
                  Florian Kohlar and
                  J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Multi-Ciphersuite Security of the Secure Shell {(SSH)} Protocol},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {369--381},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660286},
  doi          = {10.1145/2660267.2660286},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BergsmaDKSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PoetteringS14,
  author       = {Bertram Poettering and
                  Douglas Stebila},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Double-Authentication-Preventing Signatures},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {436--453},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_25},
  doi          = {10.1007/978-3-319-11203-9\_25},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/PoetteringS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/ManulisSD14,
  author       = {Mark Manulis and
                  Douglas Stebila and
                  Nick Denham},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Secure Modular Password Authentication for the Web Using Channel Bindings},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {167--189},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_11},
  doi          = {10.1007/978-3-319-14054-4\_11},
  timestamp    = {Sat, 09 Apr 2022 12:41:37 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/ManulisSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlawatugodaSB14,
  author       = {Janaka Alawatugoda and
                  Douglas Stebila and
                  Colin Boyd},
  title        = {Modelling After-the-fact Leakage for Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/131},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlawatugodaSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlawatugodaBS14,
  author       = {Janaka Alawatugoda and
                  Colin Boyd and
                  Douglas Stebila},
  title        = {Continuous After-the-fact Leakage-Resilient Key Exchange (full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/264},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlawatugodaBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCNS14,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  Michael Naehrig and
                  Douglas Stebila},
  title        = {Post-quantum key exchange for the {TLS} protocol from the ring learning
                  with errors problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/599},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlawatugodaSB14a,
  author       = {Janaka Alawatugoda and
                  Douglas Stebila and
                  Colin Boyd},
  title        = {Protecting Encrypted Cookies from Compression Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {724},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/724},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlawatugodaSB14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisSD14,
  author       = {Mark Manulis and
                  Douglas Stebila and
                  Nick Denham},
  title        = {Secure modular password authentication for the web using channel bindings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {731},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/731},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GutoskiS14,
  author       = {Gus Gutoski and
                  Douglas Stebila},
  title        = {Hierarchical deterministic Bitcoin wallets that tolerate key leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {998},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/998},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GutoskiS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GoldbergSU13,
  author       = {Ian Goldberg and
                  Douglas Stebila and
                  Berkant Ustaoglu},
  title        = {Anonymity and one-way authentication in key exchange protocols},
  journal      = {Des. Codes Cryptogr.},
  volume       = {67},
  number       = {2},
  pages        = {245--269},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10623-011-9604-z},
  doi          = {10.1007/S10623-011-9604-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GoldbergSU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/NietoMPRS13,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Bertram Poettering and
                  Jothi Rangasamy and
                  Douglas Stebila},
  title        = {Publicly verifiable ciphertexts},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {749--778},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130473},
  doi          = {10.3233/JCS-130473},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/NietoMPRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SouthS13,
  author       = {Leah F. South and
                  Douglas Stebila},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Count-Min Sketches for Estimating Password Frequency within Hamming
                  Distance Two},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {388--402},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_27},
  doi          = {10.1007/978-3-642-39059-3\_27},
  timestamp    = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SouthS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GiesenKS13,
  author       = {Florian Giesen and
                  Florian Kohlar and
                  Douglas Stebila},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {On the security of {TLS} renegotiation},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {387--398},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516694},
  doi          = {10.1145/2508859.2516694},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GiesenKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ArianezhadCKS13,
  author       = {Majid Arianezhad and
                  L. Jean Camp and
                  Timothy Kelley and
                  Douglas Stebila},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Lujo Bauer and
                  Jaehong Park},
  title        = {Comparative eye tracking of experts and novices in web single sign-on},
  booktitle    = {Third {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435349.2435362},
  doi          = {10.1145/2435349.2435362},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ArianezhadCKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BroadbentGS13,
  author       = {Anne Broadbent and
                  Gus Gutoski and
                  Douglas Stebila},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Quantum One-Time Programs - (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {344--360},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_20},
  doi          = {10.1007/978-3-642-40084-1\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BroadbentGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BoydCFPPS13,
  author       = {Colin Boyd and
                  Cas Cremers and
                  Mich{\`{e}}le Feltz and
                  Kenneth G. Paterson and
                  Bertram Poettering and
                  Douglas Stebila},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {{ASICS:} Authenticated Key Exchange Security Incorporating Certification
                  Systems},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {381--399},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_22},
  doi          = {10.1007/978-3-642-40203-6\_22},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BoydCFPPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ArianezhadSM13,
  author       = {Majid Arianezhad and
                  Douglas Stebila and
                  Behzad Mozaffari},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Usability and Security of Gaze-Based Graphical Grid Passwords},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_2},
  doi          = {10.1007/978-3-642-41320-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ArianezhadSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/MoscaSU13,
  author       = {Michele Mosca and
                  Douglas Stebila and
                  Berkant Ustaoglu},
  editor       = {Philippe Gaborit},
  title        = {Quantum Key Distribution in the Classical Authenticated Key Exchange
                  Framework},
  booktitle    = {Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013,
                  Limoges, France, June 4-7, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7932},
  pages        = {136--154},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38616-9\_9},
  doi          = {10.1007/978-3-642-38616-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/MoscaSU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoetteringS13,
  author       = {Bertram Poettering and
                  Douglas Stebila},
  title        = {Double-authentication-preventing signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoetteringS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BroadbentGS13,
  author       = {Anne Broadbent and
                  Gus Gutoski and
                  Douglas Stebila},
  title        = {Quantum one-time programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BroadbentGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydCFPPS13,
  author       = {Colin Boyd and
                  Cas Cremers and
                  Mich{\`{e}}le Feltz and
                  Kenneth G. Paterson and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {{ASICS:} Authenticated Key Exchange Security Incorporating Certification
                  Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydCFPPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingGKSS13,
  author       = {Benjamin Dowling and
                  Florian Giesen and
                  Florian Kohlar and
                  J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  title        = {Multi-ciphersuite security and the {SSH} protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {813},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/813},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingGKSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RangasamySBNK12,
  author       = {Jothi Rangasamy and
                  Douglas Stebila and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Lakshmi Kuppusamy},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Effort-Release Public-Key Encryption from Cryptographic Puzzles},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {194--207},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_15},
  doi          = {10.1007/978-3-642-31448-3\_15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/RangasamySBNK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KuppusamyRSBN12,
  author       = {Lakshmi Kuppusamy and
                  Jothi Rangasamy and
                  Douglas Stebila and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Practical client puzzles in the standard model},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {42--43},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414480},
  doi          = {10.1145/2414456.2414480},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KuppusamyRSBN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NietoMPRS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Bertram Poettering and
                  Jothi Rangasamy and
                  Douglas Stebila},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Publicly Verifiable Ciphertexts},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {393--410},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_22},
  doi          = {10.1007/978-3-642-32928-9\_22},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NietoMPRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/HassanzadehNS12,
  author       = {Reza Hassanzadeh and
                  Richi Nayak and
                  Douglas Stebila},
  editor       = {Xiaoyang Sean Wang and
                  Isabel F. Cruz and
                  Alex Delis and
                  Guangyan Huang},
  title        = {Analyzing the Effectiveness of Graph Metrics for Anomaly Detection
                  in Online Social Networks},
  booktitle    = {Web Information Systems Engineering - {WISE} 2012 - 13th International
                  Conference, Paphos, Cyprus, November 28-30, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7651},
  pages        = {624--630},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35063-4\_45},
  doi          = {10.1007/978-3-642-35063-4\_45},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wise/HassanzadehNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1211-1080,
  author       = {Anne Broadbent and
                  Gus Gutoski and
                  Douglas Stebila},
  title        = {Quantum one-time programs},
  journal      = {CoRR},
  volume       = {abs/1211.1080},
  year         = {2012},
  url          = {http://arxiv.org/abs/1211.1080},
  eprinttype    = {arXiv},
  eprint       = {1211.1080},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1211-1080.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NietoMPRS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Bertram Poettering and
                  Jothi Rangasamy and
                  Douglas Stebila},
  title        = {Publicly Verifiable Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NietoMPRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoscaSU12,
  author       = {Michele Mosca and
                  Douglas Stebila and
                  Berkant Ustaoglu},
  title        = {Quantum Key Distribution in the Classical Authenticated Key Exchange
                  Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoscaSU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisPS12,
  author       = {Mark Manulis and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {Plaintext Awareness in Identity-Based Key Encapsulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/559},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiesenKS12,
  author       = {Florian Giesen and
                  Florian Kohlar and
                  Douglas Stebila},
  title        = {On the Security of {TLS} Renegotiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiesenKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RangasamySBN11,
  author       = {Jothi Rangasamy and
                  Douglas Stebila and
                  Colin Boyd and
                  Juanma Gonz{\'{a}}lez Nieto},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {An integrated approach to cryptographic mitigation of denial-of-service
                  attacks},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {114--123},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966929},
  doi          = {10.1145/1966913.1966929},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RangasamySBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/StebilaKRBN11,
  author       = {Douglas Stebila and
                  Lakshmi Kuppusamy and
                  Jothi Rangasamy and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Aggelos Kiayias},
  title        = {Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant
                  Protocols},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {284--301},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_19},
  doi          = {10.1007/978-3-642-19074-2\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/StebilaKRBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/RangasamySKBN11,
  author       = {Jothi Rangasamy and
                  Douglas Stebila and
                  Lakshmi Kuppusamy and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Howon Kim},
  title        = {Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service
                  Protection},
  booktitle    = {Information Security and Cryptology - {ICISC} 2011 - 14th International
                  Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7259},
  pages        = {319--331},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31912-9\_21},
  doi          = {10.1007/978-3-642-31912-9\_21},
  timestamp    = {Wed, 01 Mar 2023 16:53:12 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/RangasamySKBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/SuriadiSCL11,
  author       = {Suriadi Suriadi and
                  Douglas Stebila and
                  Andrew J. Clark and
                  Hua Liu},
  title        = {Defending Web Services against Denial of Service Attacks Using Client
                  Puzzles},
  booktitle    = {{IEEE} International Conference on Web Services, {ICWS} 2011, Washington,
                  DC, USA, July 4-9, 2011},
  pages        = {25--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICWS.2011.22},
  doi          = {10.1109/ICWS.2011.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/SuriadiSCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KuppusamyRSBN11,
  author       = {Lakshmi Kuppusamy and
                  Jothi Rangasamy and
                  Douglas Stebila and
                  Colin Boyd and
                  Juanma Gonz{\'{a}}lez Nieto},
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {Towards a Provably Secure DoS-Resilient Key Exchange Protocol with
                  Perfect Forward Secrecy},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  pages        = {379--398},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6\_27},
  doi          = {10.1007/978-3-642-25578-6\_27},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/KuppusamyRSBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RangasamySKBN11,
  author       = {Jothi Rangasamy and
                  Douglas Stebila and
                  Lakshmi Kuppusamy and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Efficient Modular Exponentiation-based Puzzles for Denial-of-Service
                  Protection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/665},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RangasamySKBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6187,
  author       = {Kevin M. Igoe and
                  Douglas Stebila},
  title        = {X.509v3 Certificates for Secure Shell Authentication},
  journal      = {{RFC}},
  volume       = {6187},
  pages        = {1--16},
  year         = {2011},
  url          = {https://doi.org/10.17487/RFC6187},
  doi          = {10.17487/RFC6187},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc6187.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PatersonS10,
  author       = {Kenneth G. Paterson and
                  Douglas Stebila},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {One-Time-Password-Authenticated Key Exchange},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {264--281},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_17},
  doi          = {10.1007/978-3-642-14081-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PatersonS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BirkettS10,
  author       = {James Birkett and
                  Douglas Stebila},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Predicate-Based Key Exchange},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {282--299},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_18},
  doi          = {10.1007/978-3-642-14081-5\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BirkettS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/StebilaUS10,
  author       = {Douglas Stebila and
                  Poornaprajna Udupi and
                  Sheueling Chang Shantz},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {Multi-Factor Password-Authenticated Key Exchange},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {56--66},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Stebila.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/StebilaUS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/CostelloS10,
  author       = {Craig Costello and
                  Douglas Stebila},
  editor       = {Michel Abdalla and
                  Paulo S. L. M. Barreto},
  title        = {Fixed Argument Pairings},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference
                  on Cryptology and Information Security in Latin America, Puebla, Mexico,
                  August 8-11, 2010, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6212},
  pages        = {92--108},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14712-8\_6},
  doi          = {10.1007/978-3-642-14712-8\_6},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/CostelloS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ozchi/Stebila10,
  author       = {Douglas Stebila},
  editor       = {Margot Brereton and
                  Stephen Viller and
                  Ben Kraal},
  title        = {Reinforcing bad behaviour: the misuse of security indicators on popular
                  websites},
  booktitle    = {Proceedings of the 22nd Australasian Computer-Human Interaction Conference,
                  {OZCHI} 2010, Brisbane, Australia, November 22-26, 2010},
  pages        = {248--251},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1952222.1952275},
  doi          = {10.1145/1952222.1952275},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ozchi/Stebila10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BirkettS10,
  author       = {James Birkett and
                  Douglas Stebila},
  title        = {Predicate-Based Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BirkettS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloS10,
  author       = {Craig Costello and
                  Douglas Stebila},
  title        = {Fixed Argument Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StebilaKRBN10,
  author       = {Douglas Stebila and
                  Lakshmi Kuppusamy and
                  Jothi Rangasamy and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Stronger difficulty notions for client puzzles and denial-of-service-resistant
                  protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StebilaKRBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Stebila09,
  author       = {Douglas Stebila},
  title        = {Classical Authenticated Key Exchange and Quantum Cryptography},
  school       = {University of Waterloo, Ontario, Canada},
  year         = {2009},
  url          = {https://hdl.handle.net/10012/4295},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Stebila09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/StebilaU09,
  author       = {Douglas Stebila and
                  Berkant Ustaoglu},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Towards Denial-of-Service-Resilient Key Agreement Protocols},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {389--406},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_27},
  doi          = {10.1007/978-3-642-02620-1\_27},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/StebilaU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/quantumcomm/StebilaML09,
  author       = {Douglas Stebila and
                  Michele Mosca and
                  Norbert L{\"{u}}tkenhaus},
  editor       = {Alexander V. Sergienko and
                  Saverio Pascazio and
                  Paolo Villoresi},
  title        = {The Case for Quantum Key Distribution},
  booktitle    = {Quantum Communication and Quantum Networking, First International
                  Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {36},
  pages        = {283--296},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11731-2\_35},
  doi          = {10.1007/978-3-642-11731-2\_35},
  timestamp    = {Sun, 02 Jun 2019 21:10:58 +0200},
  biburl       = {https://dblp.org/rec/conf/quantumcomm/StebilaML09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StebilaML09,
  author       = {Douglas Stebila and
                  Michele Mosca and
                  Norbert L{\"{u}}tkenhaus},
  title        = {The Case for Quantum Key Distribution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StebilaML09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS09,
  author       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {One-time-password-authenticated key exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5656,
  author       = {Douglas Stebila and
                  Jon Green},
  title        = {Elliptic Curve Algorithm Integration in the Secure Shell Transport
                  Layer},
  journal      = {{RFC}},
  volume       = {5656},
  pages        = {1--20},
  year         = {2009},
  url          = {https://doi.org/10.17487/RFC5656},
  doi          = {10.17487/RFC5656},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5656.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StebilaUS08,
  author       = {Douglas Stebila and
                  Poornaprajna Udupi and
                  Sheueling Chang Shantz},
  title        = {Multi-Factor Password-Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StebilaUS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StebilaT06,
  author       = {Douglas Stebila and
                  Nicolas Th{\'{e}}riault},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Unified Point Addition Formul{\ae} and Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {354--368},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_28},
  doi          = {10.1007/11894063\_28},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/StebilaT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StebilaT05,
  author       = {Douglas Stebila and
                  Nicolas Th{\'{e}}riault},
  title        = {Unified Point Addition Formul{\ae} and Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/419},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StebilaT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GuptaSFSGE04,
  author       = {Vipul Gupta and
                  Douglas Stebila and
                  Stephen Fung and
                  Sheueling Chang Shantz and
                  Nils Gura and
                  Hans Eberle},
  title        = {Speeding up Secure Web Transactions Using Elliptic Curve Cryptography},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2004, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2004},
  url          = {https://www.ndss-symposium.org/ndss2004/speeding-secure-web-transactions-using-elliptic-curve-cryptography/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GuptaSFSGE04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/GuptaSS04,
  author       = {Vipul Gupta and
                  Douglas Stebila and
                  Sheueling Chang Shantz},
  editor       = {Stuart I. Feldman and
                  Mike Uretsky and
                  Marc Najork and
                  Craig E. Wills},
  title        = {Integrating elliptic curve cryptography into the web's security infrastructure},
  booktitle    = {Proceedings of the 13th international conference on World Wide Web
                  - Alternate Track Papers {\&} Posters, {WWW} 2004, New York, NY,
                  USA, May 17-20, 2004},
  pages        = {402--403},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1013367.1013496},
  doi          = {10.1145/1013367.1013496},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/GuptaSS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeimerskirchSS03,
  author       = {Andr{\'{e}} Weimerskirch and
                  Douglas Stebila and
                  Sheueling Chang Shantz},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Generic {GF(2)} Arithmetic in Software and Its Application to {ECC}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {79--92},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_8},
  doi          = {10.1007/3-540-45067-X\_8},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WeimerskirchSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuraSEGGFGS02,
  author       = {Nils Gura and
                  Sheueling Chang Shantz and
                  Hans Eberle and
                  Sumit Gupta and
                  Vipul Gupta and
                  Daniel F. Finchelstein and
                  Edouard Goupy and
                  Douglas Stebila},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {An End-to-End Systems Approach to Elliptic Curve Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {349--365},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_26},
  doi          = {10.1007/3-540-36400-5\_26},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GuraSEGGFGS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/GuptaGSS02,
  author       = {Vipul Gupta and
                  Sumit Gupta and
                  Sheueling Chang Shantz and
                  Douglas Stebila},
  editor       = {W. Douglas Maughan and
                  Nitin H. Vaidya},
  title        = {Performance analysis of elliptic curve cryptography for {SSL}},
  booktitle    = {Proceedings of the 2002 {ACM} Workshop on Wireless Security, Atlanta,
                  GA, USA, September 28, 2002},
  pages        = {87--94},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/570681.570691},
  doi          = {10.1145/570681.570691},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/GuptaGSS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics