default search action
Douglas Stebila
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c72]Douglas Stebila, Spencer Wilson:
Quantum-Safe Account Recovery for WebAuthn. AsiaCCS 2024 - [c71]Carlos Aguilar Melchor, Thomas Bailleux, Jason Goertzen, Adrien Guinet, David Joseph, Douglas Stebila:
TurboTLS: TLS Connection Establishment with 1 Less Round Trip. ESORICS (2) 2024: 24-44 - [e12]Leonid Reyzin, Douglas Stebila:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14920, Springer 2024, ISBN 978-3-031-68375-6 [contents] - [e11]Leonid Reyzin, Douglas Stebila:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14921, Springer 2024, ISBN 978-3-031-68378-7 [contents] - [e10]Leonid Reyzin, Douglas Stebila:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14922, Springer 2024, ISBN 978-3-031-68381-7 [contents] - [e9]Leonid Reyzin, Douglas Stebila:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 14923, Springer 2024, ISBN 978-3-031-68384-8 [contents] - [e8]Leonid Reyzin, Douglas Stebila:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part V. Lecture Notes in Computer Science 14924, Springer 2024, ISBN 978-3-031-68387-9 [contents] - [e7]Leonid Reyzin, Douglas Stebila:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part VI. Lecture Notes in Computer Science 14925, Springer 2024, ISBN 978-3-031-68390-9 [contents] - [e6]Leonid Reyzin, Douglas Stebila:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part VII. Lecture Notes in Computer Science 14926, Springer 2024, ISBN 978-3-031-68393-0 [contents] - [e5]Leonid Reyzin, Douglas Stebila:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part VIII. Lecture Notes in Computer Science 14927, Springer 2024, ISBN 978-3-031-68396-1 [contents] - [e4]Leonid Reyzin, Douglas Stebila:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part IX. Lecture Notes in Computer Science 14928, Springer 2024, ISBN 978-3-031-68399-2 [contents] - [e3]Leonid Reyzin, Douglas Stebila:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part X. Lecture Notes in Computer Science 14929, Springer 2024, ISBN 978-3-031-68402-9 [contents] - [i65]Douglas Stebila:
Security analysis of the iMessage PQ3 protocol. IACR Cryptol. ePrint Arch. 2024: 357 (2024) - [i64]Douglas Stebila, Spencer Wilson:
Quantum-Safe Account Recovery for WebAuthn. IACR Cryptol. ePrint Arch. 2024: 678 (2024) - [i63]Felix Günther, Douglas Stebila, Shannon Veitch:
Obfuscated Key Exchange. IACR Cryptol. ePrint Arch. 2024: 1086 (2024) - [i62]Chris Brzuska, Cas Cremers, Håkon Jacobsen, Douglas Stebila, Bogdan Warinschi:
Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols. IACR Cryptol. ePrint Arch. 2024: 1215 (2024) - 2023
- [j16]Sungmi Park, Douglas Stebila:
The Future of Digital Investigation: Automated Legal Inference. IEEE Secur. Priv. 21(1): 84-90 (2023) - [c70]Marcel Tiepelt, Edward Eaton, Douglas Stebila:
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements. ESORICS (1) 2023: 168-188 - [c69]Jason Goertzen, Douglas Stebila:
Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation. PQCrypto 2023: 535-564 - [i61]Carlos Aguilar Melchor, Thomas Bailleux, Jason Goertzen, David Joseph, Douglas Stebila:
TurboTLS: TLS connection establishment with 1 less round trip. CoRR abs/2302.05311 (2023) - [i60]Chelsea Komlo, Ian Goldberg, Douglas Stebila:
A Formal Treatment of Distributed Key Generation, and New Constructions. IACR Cryptol. ePrint Arch. 2023: 292 (2023) - [i59]Marcel Tiepelt, Edward Eaton, Douglas Stebila:
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements. IACR Cryptol. ePrint Arch. 2023: 1513 (2023) - 2022
- [j15]Jörg Schwenk, Douglas Stebila:
A reduction-based proof for authentication and session key security in three-party Kerberos. Int. J. Appl. Cryptogr. 4(2): 61-84 (2022) - [c68]Tim Güneysu, Philip W. Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha:
Proof-of-Possession for KEM Certificates using Verifiable Generation. CCS 2022: 1337-1351 - [c67]Sofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers:
A Tale of Two Models: Formal Verification of KEMTLS via Tamarin. ESORICS (3) 2022: 63-83 - [c66]Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers:
Improving Software Quality in Cryptography Standardization Projects. EuroS&P Workshops 2022: 19-30 - [c65]Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, Douglas Stebila:
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake. Public Key Cryptography (2) 2022: 3-34 - [i58]Jason Goertzen, Douglas Stebila:
Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation. CoRR abs/2211.14196 (2022) - [i57]Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers:
Improving Software Quality in Cryptography Standardization Projects. IACR Cryptol. ePrint Arch. 2022: 337 (2022) - [i56]Tim Güneysu, Philip W. Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha:
Proof-of-possession for KEM certificates using verifiable generation. IACR Cryptol. ePrint Arch. 2022: 703 (2022) - [i55]Sofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers:
A tale of two models: formal verification of KEMTLS via Tamarin. IACR Cryptol. ePrint Arch. 2022: 1111 (2022) - 2021
- [j14]Xavier Boyen, Udyani Herath, Matthew McKague, Douglas Stebila:
Associative Blockchain for Decentralized PKI Transparency. Cryptogr. 5(2): 14 (2021) - [j13]Alfred Menezes, Douglas Stebila:
Challenges in Cryptography. IEEE Secur. Priv. 19(2): 70-73 (2021) - [j12]Alfred Menezes, Douglas Stebila:
End-to-End Security: When Do We Have It? IEEE Secur. Priv. 19(4): 60-64 (2021) - [j11]Alfred Menezes, Douglas Stebila:
The Advanced Encryption Standard: 20 Years Later. IEEE Secur. Priv. 19(6): 98-102 (2021) - [j10]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol. J. Cryptol. 34(4): 37 (2021) - [j9]Philip W. Hodges, Douglas Stebila:
Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications. IACR Trans. Symmetric Cryptol. 2021(2): 389-422 (2021) - [c64]Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila:
SoK: Game-Based Security Models for Group Key Exchange. CT-RSA 2021: 148-176 - [c63]Peter Schwabe, Douglas Stebila, Thom Wiggers:
More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys. ESORICS (1) 2021: 3-22 - [c62]Edward Eaton, Douglas Stebila, Roy Stracovsky:
Post-quantum Key-Blinding for Authentication in Anonymity Networks. LATINCRYPT 2021: 67-87 - [c61]Nina Bindel, Douglas Stebila, Shannon Veitch:
Improved Attacks Against Key Reuse in Learning with Errors Key Exchange. LATINCRYPT 2021: 168-188 - [c60]Edward Eaton, Douglas Stebila:
The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols. PQCrypto 2021: 154-173 - [i54]Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila:
SoK: Game-based Security Models for Group Key Exchange. IACR Cryptol. ePrint Arch. 2021: 305 (2021) - [i53]Edward Eaton, Douglas Stebila:
The "quantum annoying" property of password-authenticated key exchange protocols. IACR Cryptol. ePrint Arch. 2021: 696 (2021) - [i52]Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, Douglas Stebila:
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake. IACR Cryptol. ePrint Arch. 2021: 769 (2021) - [i51]Peter Schwabe, Douglas Stebila, Thom Wiggers:
More efficient post-quantum KEMTLS with pre-distributed public keys. IACR Cryptol. ePrint Arch. 2021: 779 (2021) - [i50]Edward Eaton, Douglas Stebila, Roy Stracovsky:
Post-Quantum Key-Blinding for Authentication in Anonymity Networks. IACR Cryptol. ePrint Arch. 2021: 963 (2021) - 2020
- [b2]Colin Boyd, Anish Mathuria, Douglas Stebila:
Protocols for Authentication and Key Establishment, Second Edition. Information Security and Cryptography, Springer 2020, ISBN 978-3-662-58145-2, pp. 1-440 - [j8]Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. J. Cryptol. 33(4): 1914-1983 (2020) - [j7]Simeon Krastnikov, Florian Kerschbaum, Douglas Stebila:
Efficient Oblivious Database Joins. Proc. VLDB Endow. 13(11): 2132-2145 (2020) - [c59]Peter Schwabe, Douglas Stebila, Thom Wiggers:
Post-Quantum TLS Without Handshake Signatures. CCS 2020: 1461-1480 - [c58]Moe Sabry, Reza Samavi, Douglas Stebila:
ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work. DPM/CBT@ESORICS 2020: 89-107 - [c57]Christian Paquin, Douglas Stebila, Goutam Tamvada:
Benchmarking Post-quantum Cryptography in TLS. PQCrypto 2020: 72-91 - [c56]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila:
Towards Post-Quantum Security for Signal's X3DH Handshake. SAC 2020: 404-430 - [e2]Kenneth G. Paterson, Douglas Stebila:
Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11959, Springer 2020, ISBN 978-3-030-38470-8 [contents] - [i49]Simeon Krastnikov, Florian Kerschbaum, Douglas Stebila:
Efficient Oblivious Database Joins. CoRR abs/2003.09481 (2020) - [i48]Moe Sabry, Reza Samavi, Douglas Stebila:
ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work. CoRR abs/2009.00086 (2020) - [i47]Peter Schwabe, Douglas Stebila, Thom Wiggers:
Post-quantum TLS without handshake signatures. IACR Cryptol. ePrint Arch. 2020: 534 (2020) - [i46]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol. IACR Cryptol. ePrint Arch. 2020: 1044 (2020) - [i45]Nina Bindel, Douglas Stebila, Shannon Veitch:
Improved attacks against key reuse in learning with errors key exchange. IACR Cryptol. ePrint Arch. 2020: 1288 (2020)
2010 – 2019
- 2019
- [c55]Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. PQCrypto 2019: 206-226 - [i44]Jörg Schwenk, Douglas Stebila:
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos. IACR Cryptol. ePrint Arch. 2019: 777 (2019) - [i43]Eric Crockett, Christian Paquin, Douglas Stebila:
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. IACR Cryptol. ePrint Arch. 2019: 858 (2019) - [i42]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila:
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms. IACR Cryptol. ePrint Arch. 2019: 1356 (2019) - [i41]Christian Paquin, Douglas Stebila, Goutam Tamvada:
Benchmarking Post-Quantum Cryptography in TLS. IACR Cryptol. ePrint Arch. 2019: 1447 (2019) - 2018
- [i40]Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2018: 903 (2018) - 2017
- [j6]Bertram Poettering, Douglas Stebila:
Double-authentication-preventing signatures. Int. J. Inf. Sec. 16(1): 1-22 (2017) - [j5]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: authenticated key exchange security incorporating certification systems. Int. J. Inf. Sec. 16(2): 151-171 (2017) - [c54]Praveen Gauravaram, Shoichi Hirose, Douglas Stebila:
Security Analysis of a Design Variant of Randomized Hashing. ATIS 2017: 14-22 - [c53]Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. EuroS&P 2017: 451-466 - [c52]Mihir Bellare, Bertram Poettering, Douglas Stebila:
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. Public Key Cryptography (2) 2017: 121-151 - [c51]Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila:
Transitioning to a Quantum-Resistant Public Key Infrastructure. PQCrypto 2017: 384-405 - [i39]Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila:
Transitioning to a Quantum-Resistant Public Key Infrastructure. IACR Cryptol. ePrint Arch. 2017: 460 (2017) - 2016
- [j4]Mark Manulis, Douglas Stebila, Franziskus Kiefer, Nick Denham:
Secure modular password authentication for the web using channel bindings. Int. J. Inf. Sec. 15(6): 597-620 (2016) - [c50]Farhad Moghimifar, Douglas Stebila:
Predicting TLS performance from key exchange performance: short paper. ACSW 2016: 44 - [c49]Mihir Bellare, Bertram Poettering, Douglas Stebila:
From Identification to Signatures, Tightly: A Framework and Generic Transforms. ASIACRYPT (2) 2016: 435-464 - [c48]Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE. CCS 2016: 1006-1018 - [c47]Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016: 55-71 - [c46]Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila:
Secure Logging Schemes and Certificate Transparency. ESORICS (2) 2016: 140-158 - [c45]Christina Brzuska, Håkon Jacobsen, Douglas Stebila:
Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters. EUROCRYPT (1) 2016: 670-698 - [c44]Douglas Stebila, Michele Mosca:
Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. SAC 2016: 14-37 - [c43]Benjamin Dowling, Douglas Stebila, Greg Zaverucha:
Authenticated Network Time Synchronization. USENIX Security Symposium 2016: 823-840 - [i38]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol. IACR Cryptol. ePrint Arch. 2016: 81 (2016) - [i37]Christina Brzuska, Håkon Jacobsen, Douglas Stebila:
Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters. IACR Cryptol. ePrint Arch. 2016: 87 (2016) - [i36]Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila:
Secure Logging Schemes and Certificate Transparency. IACR Cryptol. ePrint Arch. 2016: 452 (2016) - [i35]Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE. IACR Cryptol. ePrint Arch. 2016: 659 (2016) - [i34]Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. IACR Cryptol. ePrint Arch. 2016: 1013 (2016) - [i33]Mihir Bellare, Bertram Poettering, Douglas Stebila:
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. IACR Cryptol. ePrint Arch. 2016: 1016 (2016) - [i32]Douglas Stebila, Michele Mosca:
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project. IACR Cryptol. ePrint Arch. 2016: 1017 (2016) - 2015
- [c42]Benjamin Dowling, Douglas Stebila:
Modelling Ciphersuite and Version Negotiation in the TLS Protocol. ACISP 2015: 270-288 - [c41]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. CCS 2015: 1197-1210 - [c40]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. Financial Cryptography 2015: 86-106 - [c39]Gus Gutoski, Douglas Stebila:
Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage. Financial Cryptography 2015: 497-504 - [c38]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. IMACC 2015: 277-294 - [c37]Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila:
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem. IEEE Symposium on Security and Privacy 2015: 553-570 - [c36]Douglas Stebila, Nick Sullivan:
An Analysis of TLS Handshake Proxying. TrustCom/BigDataSE/ISPA (1) 2015: 279-286 - [e1]Ernest Foo, Douglas Stebila:
Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. Lecture Notes in Computer Science 9144, Springer 2015, ISBN 978-3-319-19961-0 [contents] - [i31]Benjamin Dowling, Douglas Stebila, Greg Zaverucha:
Authenticated Network Time Synchronization. IACR Cryptol. ePrint Arch. 2015: 171 (2015) - [i30]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. IACR Cryptol. ePrint Arch. 2015: 335 (2015) - [i29]Benjamin Dowling, Douglas Stebila:
Modelling ciphersuite and version negotiation in the TLS protocol. IACR Cryptol. ePrint Arch. 2015: 652 (2015) - [i28]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. IACR Cryptol. ePrint Arch. 2015: 914 (2015) - [i27]Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. IACR Cryptol. ePrint Arch. 2015: 1150 (2015) - [i26]Mihir Bellare, Douglas Stebila:
Double-Authentication-Preventing Signatures from Trapdoor Identification. IACR Cryptol. ePrint Arch. 2015: 1157 (2015) - 2014
- [j3]Mark Manulis, Bertram Poettering, Douglas Stebila:
Plaintext awareness in identity-based key encapsulation. Int. J. Inf. Sec. 13(1): 25-49 (2014) - [c35]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-Fact Leakage-Resilient Key Exchange. ACISP 2014: 258-273 - [c34]Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila:
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. AISC 2014: 37-45 - [c33]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Modelling after-the-fact leakage for key exchange. AsiaCCS 2014: 207-216 - [c32]Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila:
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. CCS 2014: 369-381 - [c31]Bertram Poettering, Douglas Stebila:
Double-Authentication-Preventing Signatures. ESORICS (1) 2014: 436-453 - [c30]Mark Manulis, Douglas Stebila, Nick Denham:
Secure Modular Password Authentication for the Web Using Channel Bindings. SSR 2014: 167-189 - [i25]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Modelling After-the-fact Leakage for Key Exchange. IACR Cryptol. ePrint Arch. 2014: 131 (2014) - [i24]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient Key Exchange (full version). IACR Cryptol. ePrint Arch. 2014: 264 (2014) - [i23]Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila:
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. IACR Cryptol. ePrint Arch. 2014: 599 (2014) - [i22]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2014: 724 (2014) - [i21]Mark Manulis, Douglas Stebila, Nick Denham:
Secure modular password authentication for the web using channel bindings. IACR Cryptol. ePrint Arch. 2014: 731 (2014) - [i20]Gus Gutoski, Douglas Stebila:
Hierarchical deterministic Bitcoin wallets that tolerate key leakage. IACR Cryptol. ePrint Arch. 2014: 998 (2014) - 2013
- [j2]Ian Goldberg, Douglas Stebila, Berkant Ustaoglu:
Anonymity and one-way authentication in key exchange protocols. Des. Codes Cryptogr. 67(2): 245-269 (2013) - [j1]