Search results
-
2017
A Comprehensive Symbolic Analysis of TLS 1.3
Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T., 30 Oct 2017, ACM SIGSAC Conference on Computer and Commuincations Security. ACM, p. 1773-1788 16 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Key Rotation for Authenticated Encryption
Everspaugh, A., Paterson, K., Ristenpart, T. & Scott, S., 2 Aug 2017, (E-pub ahead of print) Advances in Cryptology – CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part III. Springer, p. 98-129 32 p. (Lecture Notes in Computer Science ; vol. 10403 ).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile379 Downloads (Pure) -
2016
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication
Cremers, C., Horvat, M., Scott, S. & Van Der Merwe, T., 18 Aug 2016, IEEE Symposium on Security and Privacy 2016. p. 470-485 16 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2015
The Pythia PRF Service
Everspaugh, A., Chatterjee, R., Juels, A., Scott, S. & Ristenpart, T., Aug 2015, Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, p. 547 15 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access