Sciweavers

CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 4 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
CTRSA
2001
Springer
108views Cryptology» more  CTRSA 2001»
14 years 5 months ago
Improving SSL Handshake Performance via Batching
We present an algorithmic approach for speeding up SSL’s performance on a web server. Our approach improves the performance of SSL’s handshake protocol by up to a factor of 2....
Hovav Shacham, Dan Boneh
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
14 years 7 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner