Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques, LNCS, vol.1976, pp.546-559, 2000. ,
Imperfect forward secrecy: How Diffie-Hellman fails in practice, ACM CCS 15, pp.5-17, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01184171
On the Security of RC4 in TLS, USENIX Security, pp.305-320, 2013. ,
Lucky thirteen: Breaking the TLS and DTLS record protocols, 2013 IEEE Symposium on Security and Privacy, pp.526-540, 2013. ,
, DROWN: Breaking TLS using SSLv2, 2016.
A concrete security treatment of symmetric encryption, 38th FOCS, pp.394-403, 1997. ,
The security of cipher block chaining, LNCS, vol.94, pp.341-358 ,
, , 1994.
The Secure Shell (SSH) Transport Layer Encryption Modes, IETF RFC, vol.4344, 2006. ,
DOI : 10.17487/rfc4344
URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc4344.txt.pdf
A messy state of the union: Taming the composite state machines of TLS, 2015 IEEE Symposium on Security and Privacy, pp.535-552, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01114250
Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH, ISOC Network and Distributed System Security Symposium (NDSS16), 2016. ,
DOI : 10.14722/ndss.2016.23418
URL : https://hal.archives-ouvertes.fr/hal-01244855
This POODLE Bites: Exploiting The SSL 3.0 Fallback, 2014. ,
PRESENT: An ultra-lightweight block cipher, LNCS, vol.4727, pp.450-466, 2007. ,
DOI : 10.1007/978-3-540-74735-2_31
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-74735-2_31.pdf
, , 2007.
The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246, 2008. ,
Privacy and authentication: An introduction to cryptography, Proceedings of the IEEE, vol.67, issue.3, pp.397-427, 1979. ,
Here come the ? ninjas. Unpublished manuscript, 2011. ,
Recommendation for Block Cipher Modes of Operation, NIST Special Publication, vol.800, 2001. ,
On the evolution of random graphs, Bull. Inst. Internat. Statist, vol.38, issue.4, pp.343-347, 1961. ,
IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap, IETF RFC, vol.6071, 2011. ,
Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS, USENIX Security, pp.113-128, 2015. ,
HIGHT: A new block cipher suitable for low-resource device, LNCS, vol.4249, pp.46-59, 2006. ,
, On the Assessment of Cryptographic Techniques and Key Lengths
, Standing Document 12, 2014.
New blockcipher modes of operation with beyond the birthday bound security, LNCS, vol.4047, pp.310-327, 2006. ,
Transport Layer Security (TLS) False Start. Internet Draft, 2015. ,
DOI : 10.17487/rfc7918
URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc7918.txt.pdf
Limits on authenticated encryption use in TLS, 2016. ,
Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes, Fast Software Encryption Workshop (FSE), 2013. ,
Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH). IETF RFC 7321, 2014. ,
CBC MAC for real-time data sources, Journal of Cryptology, vol.13, issue.3, pp.315-338, 2000. ,
The crime attack, EKOparty Security Conference, vol.2012, 2012. ,
Problems with Proposed IP Cryptography, 1995. ,
Evaluation of Some Blockcipher Modes of Operation, CRYPREC, 2011. ,
Parallel collision search with cryptanalytic applications, Journal of Cryptology, vol.12, issue.1, pp.1-28, 1999. ,
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS, USENIX Security, pp.97-112, 2015. ,
A new variant of PMAC: Beyond the birthday bound, LNCS, vol.6841, pp.596-609, 2011. ,
The Secure Shell (SSH) Transport Layer Protocol, IETF RFC, vol.4253, 2006. ,