Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques, LNCS, pp.546-559, 1976. ,
DOI : 10.1007/3-540-44448-3_42
Imperfect Forward Secrecy, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.5-17, 2015. ,
DOI : 10.1145/2810103.2813707
URL : https://hal.archives-ouvertes.fr/hal-01184171
On the Security of RC4 in TLS, USENIX Security, pp.305-320, 2013. ,
Lucky thirteen: Breaking the TLS and DTLS record protocols, 2013 IEEE Symposium on Security and Privacy, pp.526-540, 2013. ,
A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.394-403, 1997. ,
DOI : 10.1109/SFCS.1997.646128
The Security of Cipher Block Chaining, LNCS, vol.839, issue.94, pp.341-358 ,
DOI : 10.1007/3-540-48658-5_32
The Secure Shell (SSH) Transport Layer Encryption Modes, 2006. ,
DOI : 10.17487/rfc4344
A messy state of the union, 2015 IEEE Symposium on Security and Privacy, pp.535-552, 2015. ,
DOI : 10.1145/3023357
URL : https://hal.archives-ouvertes.fr/hal-01114250
Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH, ISOC Network and Distributed System Security Symposium (NDSS16), 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01244855
This POODLE Bites: Exploiting The SSL 3.0 Fallback, 2014. ,
PRESENT: An Ultra-Lightweight Block Cipher, CHES 2007, pp.450-466 ,
DOI : 10.1007/978-3-540-74735-2_31
The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246, 2008. ,
Privacy and authentication: An introduction to cryptography, Proceedings of the IEEE, pp.397-427, 1979. ,
DOI : 10.1109/PROC.1979.11256
Here come the ? ninjas. Unpublished manuscript, 2011. ,
Recommendation for Block Cipher Modes of Operation, National Institute for Standards and Technology, 2001. ,
On the evolution of random graphs, Bull. Inst. Internat. Statist, vol.38, issue.4, pp.343-347, 1961. ,
IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap. IETF RFC 6071 Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS, USENIX Security, pp.113-128, 2011. ,
DOI : 10.17487/rfc6071
HIGHT: A New Block Cipher Suitable for Low-Resource Device, LNCS, vol.4249, pp.46-59, 2006. ,
DOI : 10.1007/11894063_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.415.5238
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security, LNCS, vol.4047, pp.310-327, 2006. ,
DOI : 10.1007/11799313_20
Transport Layer Security (TLS) False Start, Internet Draft, 2015. ,
DOI : 10.17487/RFC7918
Limits on authenticated encryption use in TLS, 2016. ,
Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes, Fast Software Encryption Workshop (FSE), 2013. ,
Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH), 2014. ,
DOI : 10.17487/rfc7321
CBC MAC for Real-Time Data Sources, Journal of Cryptology, vol.13, issue.3, pp.315-338, 2000. ,
DOI : 10.1007/s001450010009
The crime attack, EKOparty Security Conference, 2012. ,
Problems with Proposed IP Cryptography Unpublished draft, 1995. ,
Evaluation of Some Blockcipher Modes of Operation, CRYPREC, 2011. ,
Parallel Collision Search with Cryptanalytic Applications, Journal of Cryptology, vol.12, issue.1, pp.1-28, 1999. ,
DOI : 10.1007/PL00003816
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS, USENIX Security, pp.97-112, 2015. ,
A New Variant of PMAC: Beyond the Birthday Bound, LNCS, vol.6841, pp.596-609, 2011. ,
DOI : 10.1007/978-3-642-22792-9_34
The Secure Shell (SSH) Transport Layer Protocol, IETF RFC, vol.4253, 2006. ,
DOI : 10.17487/rfc4253