Browse > Article

TLS 안전성 연구 : 최근 Crypto 연구 결과를 중심으로  

Byun, Jin Wook (평택대학교 정보통신학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Hugo Krawczyk, Kenneth G. Paterson, and Hoeteck Wee, "On the Security of the TLS Protocol: A Systematic Analysis", In Proc. of Crypto 2013, LNCS vol. 8042, pages 429-448, Springer, August, 2013.
2 Florian Giesen, Florian Kohlar, and Douglas Stebila, "On the Security of TLS Renegotiation", Cryptology ePrint Archive, Report 2012/630, http://eprint.iacr.org/2012/630
3 D. Hofheinz and E. Kiltz, "Secure hybrid encryption from weakened key encapsulation", In Proc. of Crypto, pages 553-571, 2007.
4 J. Jonsson and B. S. Kaliski Jr., "On the security of RSA encryption in TLS", In Proc. of Crypto 2002, LNCS 2442 pages 127-142, Springer, August, 2002.
5 Tibor Jager, Florian Kohlar, Sven Schage, and Jorg Schwenk, "On the Security of TLS-DHE in the standard model" In Proc. of Crypto 2012, LNCS vol. 7417, pages 273-293, Springer, August, 2012.
6 Florian Kohlar, Sven Schage, and Jorg Schewenk, "On the Security of TLS-DH and TLS-RSA in the Standard Model", Cryptology ePrint Archive, Report 2013/367, http://eprint.iacr.org/2013/367
7 Paul Morrissey, Nigel P. Smart, and Bogdan Warinschi, "A modular security analysis of the TLS handshake protocol", In Proc. of Asiacrypto 2008, LNCS vol. 5350, pages 55-73. Springer, December 2008.
8 Paul Morrissey, Nigel P. Smart, and Bogdan Warinschi, "The TLS handshake protocol: A modular analysis", Journal of Cryptology, 23(2): 187-223, April 2010.   DOI
9 Kenneth G. Paterson, Thomas Ristenpart, and Thomas Shrimpton, "Tag size does matter: attacks and proofs for the record protocol. In Proc. of Asiacrypt 2011, LNCS 7073, Springer, December, 2011.
10 Marsh Ray and Steve Dispensa, "Renegotiating TLS" November 2009. http://extendedsubset.com/ Renegotiating_tls.pdf
11 Eric Rescorla, Marsh Ray, Steve Dispensa, and Nasko Oskov, "Transport layer security(TLS) renegotiation indicatin extension", February 2010, RFC 5746.