


Остановите войну!
for scientists:


default search action
Douglas Stebila
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j16]Sungmi Park
, Douglas Stebila:
The Future of Digital Investigation: Automated Legal Inference. IEEE Secur. Priv. 21(1): 84-90 (2023) - [c69]Jason Goertzen, Douglas Stebila
:
Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation. PQCrypto 2023: 535-564 - [i61]Carlos Aguilar Melchor, Thomas Bailleux, Jason Goertzen, David Joseph, Douglas Stebila:
TurboTLS: TLS connection establishment with 1 less round trip. CoRR abs/2302.05311 (2023) - [i60]Chelsea Komlo, Ian Goldberg, Douglas Stebila:
A Formal Treatment of Distributed Key Generation, and New Constructions. IACR Cryptol. ePrint Arch. 2023: 292 (2023) - [i59]Marcel Tiepelt, Edward Eaton, Douglas Stebila:
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements. IACR Cryptol. ePrint Arch. 2023: 1513 (2023) - 2022
- [j15]Jörg Schwenk, Douglas Stebila:
A reduction-based proof for authentication and session key security in three-party Kerberos. Int. J. Appl. Cryptogr. 4(2): 61-84 (2022) - [c68]Tim Güneysu, Philip W. Hodges, Georg Land
, Mike Ounsworth, Douglas Stebila, Greg Zaverucha:
Proof-of-Possession for KEM Certificates using Verifiable Generation. CCS 2022: 1337-1351 - [c67]Sofía Celi
, Jonathan Hoyland
, Douglas Stebila
, Thom Wiggers
:
A Tale of Two Models: Formal Verification of KEMTLS via Tamarin. ESORICS (3) 2022: 63-83 - [c66]Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers
:
Improving Software Quality in Cryptography Standardization Projects. EuroS&P Workshops 2022: 19-30 - [c65]Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, Douglas Stebila:
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake. Public Key Cryptography (2) 2022: 3-34 - [i58]Jason Goertzen, Douglas Stebila:
Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation. CoRR abs/2211.14196 (2022) - [i57]Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers:
Improving Software Quality in Cryptography Standardization Projects. IACR Cryptol. ePrint Arch. 2022: 337 (2022) - [i56]Tim Güneysu, Philip W. Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha:
Proof-of-possession for KEM certificates using verifiable generation. IACR Cryptol. ePrint Arch. 2022: 703 (2022) - [i55]Sofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers:
A tale of two models: formal verification of KEMTLS via Tamarin. IACR Cryptol. ePrint Arch. 2022: 1111 (2022) - 2021
- [j14]Xavier Boyen, Udyani Herath, Matthew McKague, Douglas Stebila:
Associative Blockchain for Decentralized PKI Transparency. Cryptogr. 5(2): 14 (2021) - [j13]Alfred Menezes
, Douglas Stebila:
Challenges in Cryptography. IEEE Secur. Priv. 19(2): 70-73 (2021) - [j12]Alfred Menezes
, Douglas Stebila:
End-to-End Security: When Do We Have It? IEEE Secur. Priv. 19(4): 60-64 (2021) - [j11]Alfred Menezes, Douglas Stebila:
The Advanced Encryption Standard: 20 Years Later. IEEE Secur. Priv. 19(6): 98-102 (2021) - [j10]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol. J. Cryptol. 34(4): 37 (2021) - [j9]Philip W. Hodges, Douglas Stebila:
Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications. IACR Trans. Symmetric Cryptol. 2021(2): 389-422 (2021) - [c64]Bertram Poettering
, Paul Rösler
, Jörg Schwenk
, Douglas Stebila
:
SoK: Game-Based Security Models for Group Key Exchange. CT-RSA 2021: 148-176 - [c63]Peter Schwabe, Douglas Stebila, Thom Wiggers
:
More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys. ESORICS (1) 2021: 3-22 - [c62]Edward Eaton, Douglas Stebila, Roy Stracovsky:
Post-quantum Key-Blinding for Authentication in Anonymity Networks. LATINCRYPT 2021: 67-87 - [c61]Nina Bindel, Douglas Stebila
, Shannon Veitch:
Improved Attacks Against Key Reuse in Learning with Errors Key Exchange. LATINCRYPT 2021: 168-188 - [c60]Edward Eaton, Douglas Stebila:
The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols. PQCrypto 2021: 154-173 - [i54]Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila:
SoK: Game-based Security Models for Group Key Exchange. IACR Cryptol. ePrint Arch. 2021: 305 (2021) - [i53]Edward Eaton, Douglas Stebila:
The "quantum annoying" property of password-authenticated key exchange protocols. IACR Cryptol. ePrint Arch. 2021: 696 (2021) - [i52]Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, Douglas Stebila:
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake. IACR Cryptol. ePrint Arch. 2021: 769 (2021) - [i51]Peter Schwabe, Douglas Stebila, Thom Wiggers:
More efficient post-quantum KEMTLS with pre-distributed public keys. IACR Cryptol. ePrint Arch. 2021: 779 (2021) - [i50]Edward Eaton, Douglas Stebila, Roy Stracovsky:
Post-Quantum Key-Blinding for Authentication in Anonymity Networks. IACR Cryptol. ePrint Arch. 2021: 963 (2021) - 2020
- [b2]Colin Boyd, Anish Mathuria, Douglas Stebila:
Protocols for Authentication and Key Establishment, Second Edition. Information Security and Cryptography, Springer 2020, ISBN 978-3-662-58145-2, pp. 1-440 - [j8]Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. J. Cryptol. 33(4): 1914-1983 (2020) - [j7]Simeon Krastnikov, Florian Kerschbaum, Douglas Stebila:
Efficient Oblivious Database Joins. Proc. VLDB Endow. 13(11): 2132-2145 (2020) - [c59]Peter Schwabe, Douglas Stebila, Thom Wiggers
:
Post-Quantum TLS Without Handshake Signatures. CCS 2020: 1461-1480 - [c58]Moe Sabry, Reza Samavi, Douglas Stebila:
ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work. DPM/CBT@ESORICS 2020: 89-107 - [c57]Christian Paquin, Douglas Stebila, Goutam Tamvada:
Benchmarking Post-quantum Cryptography in TLS. PQCrypto 2020: 72-91 - [c56]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila:
Towards Post-Quantum Security for Signal's X3DH Handshake. SAC 2020: 404-430 - [e2]Kenneth G. Paterson, Douglas Stebila:
Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11959, Springer 2020, ISBN 978-3-030-38470-8 [contents] - [i49]Simeon Krastnikov, Florian Kerschbaum, Douglas Stebila:
Efficient Oblivious Database Joins. CoRR abs/2003.09481 (2020) - [i48]Moe Sabry, Reza Samavi, Douglas Stebila:
ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work. CoRR abs/2009.00086 (2020) - [i47]Peter Schwabe, Douglas Stebila, Thom Wiggers:
Post-quantum TLS without handshake signatures. IACR Cryptol. ePrint Arch. 2020: 534 (2020) - [i46]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol. IACR Cryptol. ePrint Arch. 2020: 1044 (2020) - [i45]Nina Bindel, Douglas Stebila, Shannon Veitch:
Improved attacks against key reuse in learning with errors key exchange. IACR Cryptol. ePrint Arch. 2020: 1288 (2020)
2010 – 2019
- 2019
- [c55]Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. PQCrypto 2019: 206-226 - [i44]Jörg Schwenk, Douglas Stebila:
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos. IACR Cryptol. ePrint Arch. 2019: 777 (2019) - [i43]Eric Crockett, Christian Paquin, Douglas Stebila:
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. IACR Cryptol. ePrint Arch. 2019: 858 (2019) - [i42]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila:
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms. IACR Cryptol. ePrint Arch. 2019: 1356 (2019) - [i41]Christian Paquin, Douglas Stebila, Goutam Tamvada:
Benchmarking Post-Quantum Cryptography in TLS. IACR Cryptol. ePrint Arch. 2019: 1447 (2019) - 2018
- [i40]Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2018: 903 (2018) - 2017
- [j6]Bertram Poettering, Douglas Stebila:
Double-authentication-preventing signatures. Int. J. Inf. Sec. 16(1): 1-22 (2017) - [j5]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: authenticated key exchange security incorporating certification systems. Int. J. Inf. Sec. 16(2): 151-171 (2017) - [c54]Praveen Gauravaram, Shoichi Hirose, Douglas Stebila:
Security Analysis of a Design Variant of Randomized Hashing. ATIS 2017: 14-22 - [c53]Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. EuroS&P 2017: 451-466 - [c52]Mihir Bellare, Bertram Poettering, Douglas Stebila:
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. Public Key Cryptography (2) 2017: 121-151 - [c51]Nina Bindel, Udyani Herath, Matthew McKague
, Douglas Stebila:
Transitioning to a Quantum-Resistant Public Key Infrastructure. PQCrypto 2017: 384-405 - [i39]Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila:
Transitioning to a Quantum-Resistant Public Key Infrastructure. IACR Cryptol. ePrint Arch. 2017: 460 (2017) - 2016
- [j4]Mark Manulis
, Douglas Stebila, Franziskus Kiefer, Nick Denham:
Secure modular password authentication for the web using channel bindings. Int. J. Inf. Sec. 15(6): 597-620 (2016) - [c50]Farhad Moghimifar, Douglas Stebila:
Predicting TLS performance from key exchange performance: short paper. ACSW 2016: 44 - [c49]Mihir Bellare, Bertram Poettering, Douglas Stebila:
From Identification to Signatures, Tightly: A Framework and Generic Transforms. ASIACRYPT (2) 2016: 435-464 - [c48]Joppe W. Bos
, Craig Costello
, Léo Ducas, Ilya Mironov
, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE. CCS 2016: 1006-1018 - [c47]Colin Boyd, Britta Hale
, Stig Frode Mjølsnes
, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016: 55-71 - [c46]Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila:
Secure Logging Schemes and Certificate Transparency. ESORICS (2) 2016: 140-158 - [c45]Christina Brzuska, Håkon Jacobsen, Douglas Stebila:
Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters. EUROCRYPT (1) 2016: 670-698 - [c44]Douglas Stebila, Michele Mosca:
Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. SAC 2016: 14-37 - [c43]Benjamin Dowling, Douglas Stebila, Greg Zaverucha:
Authenticated Network Time Synchronization. USENIX Security Symposium 2016: 823-840 - [i38]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol. IACR Cryptol. ePrint Arch. 2016: 81 (2016) - [i37]Christina Brzuska, Håkon Jacobsen, Douglas Stebila:
Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters. IACR Cryptol. ePrint Arch. 2016: 87 (2016) - [i36]Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila:
Secure Logging Schemes and Certificate Transparency. IACR Cryptol. ePrint Arch. 2016: 452 (2016) - [i35]Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE. IACR Cryptol. ePrint Arch. 2016: 659 (2016) - [i34]Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. IACR Cryptol. ePrint Arch. 2016: 1013 (2016) - [i33]Mihir Bellare, Bertram Poettering, Douglas Stebila:
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. IACR Cryptol. ePrint Arch. 2016: 1016 (2016) - [i32]Douglas Stebila, Michele Mosca:
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project. IACR Cryptol. ePrint Arch. 2016: 1017 (2016) - 2015
- [c42]Benjamin Dowling, Douglas Stebila:
Modelling Ciphersuite and Version Negotiation in the TLS Protocol. ACISP 2015: 270-288 - [c41]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. CCS 2015: 1197-1210 - [c40]Janaka Alawatugoda
, Douglas Stebila, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. Financial Cryptography 2015: 86-106 - [c39]Gus Gutoski, Douglas Stebila:
Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage. Financial Cryptography 2015: 497-504 - [c38]Janaka Alawatugoda
, Douglas Stebila, Colin Boyd:
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. IMACC 2015: 277-294 - [c37]Joppe W. Bos
, Craig Costello
, Michael Naehrig, Douglas Stebila:
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem. IEEE Symposium on Security and Privacy 2015: 553-570 - [c36]Douglas Stebila, Nick Sullivan:
An Analysis of TLS Handshake Proxying. TrustCom/BigDataSE/ISPA (1) 2015: 279-286 - [e1]Ernest Foo, Douglas Stebila:
Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. Lecture Notes in Computer Science 9144, Springer 2015, ISBN 978-3-319-19961-0 [contents] - [i31]Benjamin Dowling, Douglas Stebila, Greg Zaverucha:
Authenticated Network Time Synchronization. IACR Cryptol. ePrint Arch. 2015: 171 (2015) - [i30]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. IACR Cryptol. ePrint Arch. 2015: 335 (2015) - [i29]Benjamin Dowling, Douglas Stebila:
Modelling ciphersuite and version negotiation in the TLS protocol. IACR Cryptol. ePrint Arch. 2015: 652 (2015) - [i28]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. IACR Cryptol. ePrint Arch. 2015: 914 (2015) - [i27]Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. IACR Cryptol. ePrint Arch. 2015: 1150 (2015) - [i26]Mihir Bellare, Douglas Stebila:
Double-Authentication-Preventing Signatures from Trapdoor Identification. IACR Cryptol. ePrint Arch. 2015: 1157 (2015) - 2014
- [j3]Mark Manulis
, Bertram Poettering, Douglas Stebila:
Plaintext awareness in identity-based key encapsulation. Int. J. Inf. Sec. 13(1): 25-49 (2014) - [c35]Janaka Alawatugoda
, Colin Boyd, Douglas Stebila:
Continuous After-the-Fact Leakage-Resilient Key Exchange. ACISP 2014: 258-273 - [c34]Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila:
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. AISC 2014: 37-45 - [c33]Janaka Alawatugoda
, Douglas Stebila, Colin Boyd:
Modelling after-the-fact leakage for key exchange. AsiaCCS 2014: 207-216 - [c32]Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila:
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. CCS 2014: 369-381 - [c31]Bertram Poettering, Douglas Stebila:
Double-Authentication-Preventing Signatures. ESORICS (1) 2014: 436-453 - [c30]Mark Manulis, Douglas Stebila, Nick Denham:
Secure Modular Password Authentication for the Web Using Channel Bindings. SSR 2014: 167-189 - [i25]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Modelling After-the-fact Leakage for Key Exchange. IACR Cryptol. ePrint Arch. 2014: 131 (2014) - [i24]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient Key Exchange (full version). IACR Cryptol. ePrint Arch. 2014: 264 (2014) - [i23]Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila:
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. IACR Cryptol. ePrint Arch. 2014: 599 (2014) - [i22]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2014: 724 (2014) - [i21]Mark Manulis, Douglas Stebila, Nick Denham:
Secure modular password authentication for the web using channel bindings. IACR Cryptol. ePrint Arch. 2014: 731 (2014) - [i20]Gus Gutoski, Douglas Stebila:
Hierarchical deterministic Bitcoin wallets that tolerate key leakage. IACR Cryptol. ePrint Arch. 2014: 998 (2014) - 2013
- [j2]Ian Goldberg, Douglas Stebila, Berkant Ustaoglu
:
Anonymity and one-way authentication in key exchange protocols. Des. Codes Cryptogr. 67(2): 245-269 (2013) - [j1]Juan Manuel González Nieto, Mark Manulis
, Bertram Poettering, Jothi Rangasamy
, Douglas Stebila:
Publicly verifiable ciphertexts. J. Comput. Secur. 21(5): 749-778 (2013) - [c29]Leah F. South
, Douglas Stebila:
Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two. ACISP 2013: 388-402 - [c28]Florian Giesen, Florian Kohlar, Douglas Stebila:
On the security of TLS renegotiation. CCS 2013: 387-398 - [c27]Majid Arianezhad, L. Jean Camp, Timothy Kelley, Douglas Stebila:
Comparative eye tracking of experts and novices in web single sign-on. CODASPY 2013: 105-116 - [c26]Anne Broadbent, Gus Gutoski, Douglas Stebila:
Quantum One-Time Programs - (Extended Abstract). CRYPTO (2) 2013: 344-360 - [c25]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013: 381-399 - [c24]Majid Arianezhad, Douglas Stebila, Behzad Mozaffari:
Usability and Security of Gaze-Based Graphical Grid Passwords. Financial Cryptography Workshops 2013: 17-33 - [c23]Michele Mosca, Douglas Stebila, Berkant Ustaoglu
:
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework. PQCrypto 2013: 136-154 - [i19]Bertram Poettering, Douglas Stebila:
Double-authentication-preventing signatures. IACR Cryptol. ePrint Arch. 2013: 333 (2013) - [i18]Anne Broadbent, Gus Gutoski, Douglas Stebila:
Quantum one-time programs. IACR Cryptol. ePrint Arch. 2013: 343 (2013) - [i17]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. IACR Cryptol. ePrint Arch. 2013: 398 (2013) - [i16]Benjamin Dowling, Florian Giesen, Florian Kohlar, Jörg Schwenk, Douglas Stebila:
Multi-ciphersuite security and the SSH protocol. IACR Cryptol. ePrint Arch. 2013: 813 (2013) - 2012
- [c22]Jothi Rangasamy
, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy
:
Effort-Release Public-Key Encryption from Cryptographic Puzzles. ACISP 2012: 194-207 - [c21]Lakshmi Kuppusamy
, Jothi Rangasamy
, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto:
Practical client puzzles in the standard model. AsiaCCS 2012: 42-43 - [c20]Juan Manuel González Nieto, Mark Manulis
, Bertram Poettering, Jothi Rangasamy
, Douglas Stebila:
Publicly Verifiable Ciphertexts. SCN 2012: 393-410 - [c19]Reza Hassanzadeh, Richi Nayak
, Douglas Stebila:
Analyzing the Effectiveness of Graph Metrics for Anomaly Detection in Online Social Networks. WISE 2012: 624-630 - [i15]Anne Broadbent, Gus Gutoski, Douglas Stebila:
Quantum one-time programs. CoRR abs/1211.1080 (2012) - [i14]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. IACR Cryptol. ePrint Arch. 2012: 357 (2012) - [i13]Michele Mosca, Douglas Stebila, Berkant Ustaoglu:
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework. IACR Cryptol. ePrint Arch. 2012: 361 (2012) - [i12]Mark Manulis, Bertram Poettering, Douglas Stebila:
Plaintext Awareness in Identity-Based Key Encapsulation. IACR Cryptol. ePrint Arch. 2012: 559 (2012) - [i11]Florian Giesen, Florian Kohlar, Douglas Stebila:
On the Security of TLS Renegotiation. IACR Cryptol. ePrint Arch. 2012: 630 (2012) - 2011
- [c18]Jothi Rangasamy
, Douglas Stebila, Colin Boyd, Juanma González Nieto:
An integrated approach to cryptographic mitigation of denial-of-service attacks. AsiaCCS 2011: 114-123 - [c17]Douglas Stebila, Lakshmi Kuppusamy
, Jothi Rangasamy
, Colin Boyd, Juan Manuel González Nieto:
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols. CT-RSA 2011: 284-301 - [c16]