The Transport Layer Security (TLS) Protocol Version 1.2, IETF RFC, vol.5246, 2008. ,
DOI : 10.17487/rfc5246
On the Security of TLS-DHE in the Standard Model, CRYPTO, 2012. ,
DOI : 10.1007/978-3-642-32009-5_17
On the Security of the TLS Protocol: A Systematic Analysis, CRYPTO, 2013. ,
DOI : 10.1007/978-3-642-40041-4_24
On the Security of the Pre-shared Key Ciphersuites of TLS, Public-Key Cryptography, 2014. ,
DOI : 10.1007/978-3-642-54631-0_38
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol, ASIACRYPT, 2011. ,
DOI : 10.1007/978-3-642-25385-0_20
The TLS protocol version 1.0, IETF RFC 2246, 1999. ,
DOI : 10.17487/rfc2246
The Transport Layer Security (TLS) Protocol Version 1.1, IETF RFC, vol.4346, 2006. ,
DOI : 10.17487/rfc4346
Implementing TLS with Verified Cryptographic Security, 2013 IEEE Symposium on Security and Privacy, p.2013 ,
DOI : 10.1109/SP.2013.37
URL : https://hal.archives-ouvertes.fr/hal-00863373
TLS session resumption without server-side state, 2008. ,
Transport Layer Security (TLS) False Start, 2010. ,
DOI : 10.17487/RFC7918
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS, 2014 IEEE Symposium on Security and Privacy, p.2014 ,
DOI : 10.1109/SP.2014.14
URL : https://hal.archives-ouvertes.fr/hal-01102259
Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL, Financial Cryptography, 2012. ,
DOI : 10.2139/ssrn.1591033
Factorization of a 512-Bit RSA Modulus, EUROCRYPT, 2000. ,
DOI : 10.1007/3-540-45539-6_1
URL : https://hal.archives-ouvertes.fr/inria-00099117
ZMap: Fast Internet-wide scanning and its security applications, USENIX Security, 2013. ,
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014. ,
DOI : 10.1145/2660267.2660286
A cross-protocol attack on the TLS protocol, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382206
The Transport Layer Security (TLS) Protocol Version 1.3, 2014. ,
Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension, IETF Internet Draft, 2014. ,
DOI : 10.17487/RFC7627
Proving the TLS Handshake Secure (As It Is), CRYPTO, 2014. ,
DOI : 10.1007/978-3-662-44381-1_14
URL : https://hal.archives-ouvertes.fr/hal-01102229
Certified computer-aided cryptography, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516652
Lessons learned from previous SSL/TLS attacks ? A brief chronology of attacks and weaknesses, IACR Cryptology ePrint Archive, 2013. ,
Analysis of the SSL 3.0 protocol, USENIX Electronic Commerce, 1996. ,
TLS renegotiation indication extension, 2010. ,
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1, CRYPTO, 1998. ,
DOI : 10.1007/BFb0055716
Attacking RSAbased sessions in SSL/TLS, CHES, 2003. ,
Revisiting SSL/TLS implementations: New bleichenbacher side channels and attacks, USENIX Security, 2014. ,
Security flaws induced by CBC padding applications to SSL, EUROCRYPT, 2002. ,
Lucky thirteen: breaking the TLS and DTLS record protocols, IEEE S&P, p.2013 ,
One bad apple: Backwards compatibility attacks on state-of-the-art cryptography, NDSS, 2013. ,
Verified Cryptographic Implementations for TLS, ACM Transactions on Information and System Security, vol.15, issue.1, pp.1-32, 2012. ,
DOI : 10.1145/2133375.2133378
URL : https://hal.archives-ouvertes.fr/hal-00863381
ASPIER: An Automated Framework for Verifying Security Protocol Implementations, 2009 22nd IEEE Computer Security Foundations Symposium, 2009. ,
DOI : 10.1109/CSF.2009.20
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06), 2006. ,
DOI : 10.1109/ASE.2006.60
JavaSPI, International Journal of Secure Software Engineering, vol.2, issue.4, pp.34-48, 2011. ,
DOI : 10.4018/jsse.2011100103
Cryptographic Protocol Analysis on Real C Code, Verification, Model Checking, and Abstract Interpretation, 2005. ,
DOI : 10.1007/978-3-540-30579-8_24
Guiding a general-purpose C verifier to prove cryptographic protocols, Journal of Computer Security, vol.22, issue.5, pp.823-866, 2014. ,
DOI : 10.3233/JCS-140508
Finding Error Handling Bugs in OpenSSL Using Coccinelle, 2010 European Dependable Computing Conference, 2010. ,
DOI : 10.1109/EDCC.2010.31
URL : https://hal.archives-ouvertes.fr/hal-00940375