Douglas Stebila
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2017
- [j6]Bertram Poettering, Douglas Stebila:
Double-authentication-preventing signatures. Int. J. Inf. Sec. 16(1): 1-22 (2017) - [j5]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: authenticated key exchange security incorporating certification systems. Int. J. Inf. Sec. 16(2): 151-171 (2017) - [c54]Praveen Gauravaram, Shoichi Hirose, Douglas Stebila:
Security Analysis of a Design Variant of Randomized Hashing. ATIS 2017: 14-22 - [c53]Katriel Cohn-Gordon, Cas J. F. Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. EuroS&P 2017: 451-466 - [c52]Mihir Bellare, Bertram Poettering, Douglas Stebila:
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. Public Key Cryptography (2) 2017: 121-151 - [c51]Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila:
Transitioning to a Quantum-Resistant Public Key Infrastructure. PQCrypto 2017: 384-405 - [i39]Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila:
Transitioning to a Quantum-Resistant Public Key Infrastructure. IACR Cryptology ePrint Archive 2017: 460 (2017) - 2016
- [j4]Mark Manulis, Douglas Stebila, Franziskus Kiefer, Nick Denham:
Secure modular password authentication for the web using channel bindings. Int. J. Inf. Sec. 15(6): 597-620 (2016) - [c50]Farhad Moghimifar, Douglas Stebila:
Predicting TLS performance from key exchange performance: short paper. ACSW 2016: 44 - [c49]Mihir Bellare, Bertram Poettering, Douglas Stebila:
From Identification to Signatures, Tightly: A Framework and Generic Transforms. ASIACRYPT (2) 2016: 435-464 - [c48]Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE. ACM Conference on Computer and Communications Security 2016: 1006-1018 - [c47]Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016: 55-71 - [c46]Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila:
Secure Logging Schemes and Certificate Transparency. ESORICS (2) 2016: 140-158 - [c45]Christina Brzuska, Håkon Jacobsen, Douglas Stebila:
Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters. EUROCRYPT (1) 2016: 670-698 - [c44]Douglas Stebila, Michele Mosca:
Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. SAC 2016: 14-37 - [c43]Benjamin Dowling, Douglas Stebila, Greg Zaverucha:
Authenticated Network Time Synchronization. USENIX Security Symposium 2016: 823-840 - [i38]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol. IACR Cryptology ePrint Archive 2016: 81 (2016) - [i37]Christina Brzuska, Håkon Jacobsen, Douglas Stebila:
Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters. IACR Cryptology ePrint Archive 2016: 87 (2016) - [i36]Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila:
Secure Logging Schemes and Certificate Transparency. IACR Cryptology ePrint Archive 2016: 452 (2016) - [i35]Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE. IACR Cryptology ePrint Archive 2016: 659 (2016) - [i34]Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila:
A Formal Security Analysis of the Signal Messaging Protocol. IACR Cryptology ePrint Archive 2016: 1013 (2016) - [i33]Mihir Bellare, Bertram Poettering, Douglas Stebila:
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. IACR Cryptology ePrint Archive 2016: 1016 (2016) - [i32]Douglas Stebila, Michele Mosca:
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project. IACR Cryptology ePrint Archive 2016: 1017 (2016) - 2015
- [c42]Benjamin Dowling, Douglas Stebila:
Modelling Ciphersuite and Version Negotiation in the TLS Protocol. ACISP 2015: 270-288 - [c41]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. ACM Conference on Computer and Communications Security 2015: 1197-1210 - [c40]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. Financial Cryptography 2015: 86-106 - [c39]Gus Gutoski, Douglas Stebila:
Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage. Financial Cryptography 2015: 497-504 - [c38]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. IMA Int. Conf. 2015: 277-294 - [c37]Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila:
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem. IEEE Symposium on Security and Privacy 2015: 553-570 - [c36]Douglas Stebila, Nick Sullivan:
An Analysis of TLS Handshake Proxying. TrustCom/BigDataSE/ISPA (1) 2015: 279-286 - [e1]Ernest Foo, Douglas Stebila:
Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. Lecture Notes in Computer Science 9144, Springer 2015, ISBN 978-3-319-19961-0 [contents] - [i31]Benjamin Dowling, Douglas Stebila, Greg Zaverucha:
Authenticated Network Time Synchronization. IACR Cryptology ePrint Archive 2015: 171 (2015) - [i30]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. IACR Cryptology ePrint Archive 2015: 335 (2015) - [i29]Benjamin Dowling, Douglas Stebila:
Modelling ciphersuite and version negotiation in the TLS protocol. IACR Cryptology ePrint Archive 2015: 652 (2015) - [i28]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. IACR Cryptology ePrint Archive 2015: 914 (2015) - [i27]Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. IACR Cryptology ePrint Archive 2015: 1150 (2015) - [i26]Mihir Bellare, Douglas Stebila:
Double-Authentication-Preventing Signatures from Trapdoor Identification. IACR Cryptology ePrint Archive 2015: 1157 (2015) - 2014
- [j3]Mark Manulis, Bertram Poettering, Douglas Stebila:
Plaintext awareness in identity-based key encapsulation. Int. J. Inf. Sec. 13(1): 25-49 (2014) - [c35]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-Fact Leakage-Resilient Key Exchange. ACISP 2014: 258-273 - [c34]Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila:
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. AISC 2014: 37-45 - [c33]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Modelling after-the-fact leakage for key exchange. AsiaCCS 2014: 207-216 - [c32]Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila:
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. ACM Conference on Computer and Communications Security 2014: 369-381 - [c31]Bertram Poettering, Douglas Stebila:
Double-Authentication-Preventing Signatures. ESORICS (1) 2014: 436-453 - [c30]Mark Manulis, Douglas Stebila, Nick Denham:
Secure Modular Password Authentication for the Web Using Channel Bindings. SSR 2014: 167-189 - [i25]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Modelling After-the-fact Leakage for Key Exchange. IACR Cryptology ePrint Archive 2014: 131 (2014) - [i24]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient Key Exchange (full version). IACR Cryptology ePrint Archive 2014: 264 (2014) - [i23]Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila:
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. IACR Cryptology ePrint Archive 2014: 599 (2014) - [i22]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. IACR Cryptology ePrint Archive 2014: 724 (2014) - [i21]Mark Manulis, Douglas Stebila, Nick Denham:
Secure modular password authentication for the web using channel bindings. IACR Cryptology ePrint Archive 2014: 731 (2014) - [i20]Gus Gutoski, Douglas Stebila:
Hierarchical deterministic Bitcoin wallets that tolerate key leakage. IACR Cryptology ePrint Archive 2014: 998 (2014) - 2013
- [j2]Ian Goldberg, Douglas Stebila, Berkant Ustaoglu:
Anonymity and one-way authentication in key exchange protocols. Des. Codes Cryptography 67(2): 245-269 (2013) - [j1]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly verifiable ciphertexts. Journal of Computer Security 21(5): 749-778 (2013) - [c29]Leah South, Douglas Stebila:
Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two. ACISP 2013: 388-402 - [c28]Florian Giesen, Florian Kohlar, Douglas Stebila:
On the security of TLS renegotiation. ACM Conference on Computer and Communications Security 2013: 387-398 - [c27]Majid Arianezhad, L. Jean Camp, Timothy Kelley, Douglas Stebila:
Comparative eye tracking of experts and novices in web single sign-on. CODASPY 2013: 105-116 - [c26]Anne Broadbent, Gus Gutoski, Douglas Stebila:
Quantum One-Time Programs - (Extended Abstract). CRYPTO (2) 2013: 344-360 - [c25]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013: 381-399 - [c24]Majid Arianezhad, Douglas Stebila, Behzad Mozaffari:
Usability and Security of Gaze-Based Graphical Grid Passwords. Financial Cryptography Workshops 2013: 17-33 - [c23]Michele Mosca, Douglas Stebila, Berkant Ustaoglu:
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework. PQCrypto 2013: 136-154 - [i19]Bertram Poettering, Douglas Stebila:
Double-authentication-preventing signatures. IACR Cryptology ePrint Archive 2013: 333 (2013) - [i18]Anne Broadbent, Gus Gutoski, Douglas Stebila:
Quantum one-time programs. IACR Cryptology ePrint Archive 2013: 343 (2013) - [i17]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. IACR Cryptology ePrint Archive 2013: 398 (2013) - [i16]Benjamin Dowling, Florian Giesen, Florian Kohlar, Jörg Schwenk, Douglas Stebila:
Multi-ciphersuite security and the SSH protocol. IACR Cryptology ePrint Archive 2013: 813 (2013) - 2012
- [c22]Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy:
Effort-Release Public-Key Encryption from Cryptographic Puzzles. ACISP 2012: 194-207 - [c21]Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto:
Practical client puzzles in the standard model. AsiaCCS 2012: 42-43 - [c20]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. SCN 2012: 393-410 - [c19]Reza Hassanzadeh, Richi Nayak, Douglas Stebila:
Analyzing the Effectiveness of Graph Metrics for Anomaly Detection in Online Social Networks. WISE 2012: 624-630 - [i15]
- [i14]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. IACR Cryptology ePrint Archive 2012: 357 (2012) - [i13]Michele Mosca, Douglas Stebila, Berkant Ustaoglu:
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework. IACR Cryptology ePrint Archive 2012: 361 (2012) - [i12]Mark Manulis, Bertram Poettering, Douglas Stebila:
Plaintext Awareness in Identity-Based Key Encapsulation. IACR Cryptology ePrint Archive 2012: 559 (2012) - [i11]Florian Giesen, Florian Kohlar, Douglas Stebila:
On the Security of TLS Renegotiation. IACR Cryptology ePrint Archive 2012: 630 (2012) - 2011
- [c18]Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto:
An integrated approach to cryptographic mitigation of denial-of-service attacks. AsiaCCS 2011: 114-123 - [c17]Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Manuel González Nieto:
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols. CT-RSA 2011: 284-301 - [c16]Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto:
Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection. ICISC 2011: 319-331 - [c15]Suriadi Suriadi, Douglas Stebila, Andrew J. Clark, Hua Liu:
Defending Web Services against Denial of Service Attacks Using Client Puzzles. ICWS 2011: 25-32 - [c14]Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto:
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy. INDOCRYPT 2011: 379-398 - [i10]Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto:
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection. IACR Cryptology ePrint Archive 2011: 665 (2011) - [i9]Kevin M. Igoe, Douglas Stebila:
X.509v3 Certificates for Secure Shell Authentication. RFC 6187: 1-16 (2011) - 2010
- [c13]Kenneth G. Paterson, Douglas Stebila:
One-Time-Password-Authenticated Key Exchange. ACISP 2010: 264-281 - [c12]
- [c11]Douglas Stebila, Poornaprajna Udupi, Sheueling Chang Shantz:
Multi-Factor Password-Authenticated Key Exchange. AISC 2010: 56-66 - [c10]
- [c9]Douglas Stebila:
Reinforcing bad behaviour: the misuse of security indicators on popular websites. OZCHI 2010: 248-251 - [i8]James Birkett, Douglas Stebila:
Predicate-Based Key Exchange. IACR Cryptology ePrint Archive 2010: 82 (2010) - [i7]Craig Costello, Douglas Stebila:
Fixed Argument Pairings. IACR Cryptology ePrint Archive 2010: 342 (2010) - [i6]Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Manuel González Nieto:
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. IACR Cryptology ePrint Archive 2010: 649 (2010)
2000 – 2009
- 2009
- [b1]Douglas Stebila:
Classical Authenticated Key Exchange and Quantum Cryptography. University of Waterloo, Ontario, Canada 2009 - [c8]Douglas Stebila, Berkant Ustaoglu:
Towards Denial-of-Service-Resilient Key Agreement Protocols. ACISP 2009: 389-406 - [c7]Douglas Stebila, Michele Mosca, Norbert Lütkenhaus:
The Case for Quantum Key Distribution. QuantumComm 2009: 283-296 - [i5]Douglas Stebila, Michele Mosca, Norbert Lütkenhaus:
The Case for Quantum Key Distribution. IACR Cryptology ePrint Archive 2009: 82 (2009) - [i4]Kenneth G. Paterson, Douglas Stebila:
One-time-password-authenticated key exchange. IACR Cryptology ePrint Archive 2009: 430 (2009) - [i3]
- 2008
- [i2]Douglas Stebila, Poornaprajna Udupi, Sheueling Chang Shantz:
Multi-Factor Password-Authenticated Key Exchange. IACR Cryptology ePrint Archive 2008: 214 (2008) - 2006
- [c6]Douglas Stebila, Nicolas Thériault:
Unified Point Addition Formulæ and Side-Channel Attacks. CHES 2006: 354-368 - 2005
- [i1]Douglas Stebila, Nicolas Thériault:
Unified Point Addition Formulæ and Side-Channel Attacks. IACR Cryptology ePrint Archive 2005: 419 (2005) - 2004
- [c5]Vipul Gupta, Douglas Stebila, Stephen Fung, Sheueling Chang Shantz, Nils Gura, Hans Eberle:
Speeding up Secure Web Transactions Using Elliptic Curve Cryptography. NDSS 2004 - [c4]Vipul Gupta, Douglas Stebila, Sheueling Chang Shantz:
Integrating elliptic curve cryptography into the web's security infrastructure. WWW (Alternate Track Papers & Posters) 2004: 402-403 - 2003
- [c3]André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz:
Generic GF(2) Arithmetic in Software and Its Application to ECC. ACISP 2003: 79-92 - 2002
- [c2]Nils Gura, Sheueling Chang Shantz, Hans Eberle, Sumit Gupta, Vipul Gupta, Daniel Finchelstein, Edouard Goupy, Douglas Stebila:
An End-to-End Systems Approach to Elliptic Curve Cryptography. CHES 2002: 349-365 - [c1]Vipul Gupta, Sumit Gupta, Sheueling Chang Shantz, Douglas Stebila:
Performance analysis of elliptic curve cryptography for SSL. Workshop on Wireless Security 2002: 87-94
Coauthor Index
Juan Manuel González Nieto
aka: Juanma González Nieto
aka: Juanma González Nieto
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2017-12-02 20:38 CET by the dblp team