Zobrazeno 1 - 10
of 103
pro vyhledávání: '"Stebila, Douglas"'
Autor:
Aguilar-Melchor, Carlos, Bailleux, Thomas, Goertzen, Jason, Guinet, Adrien, Joseph, David, Stebila, Douglas
We show how to establish TLS connections using one less round trip. In our approach, which we call TurboTLS, the initial client-to-server and server-to-client flows of the TLS handshake are sent over UDP rather than TCP. At the same time, in the same
Externí odkaz:
http://arxiv.org/abs/2302.05311
Autor:
Goertzen, Jason, Stebila, Douglas
The Domain Name System Security Extensions (DNSSEC) provide authentication of DNS responses using digital signatures. DNS operates primarily over UDP, which leads to several constraints: notably, packets should be at most 1232 bytes long to avoid pro
Externí odkaz:
http://arxiv.org/abs/2211.14196
Data breaches-mass leakage of stored information-are a major security concern. Encryption can provide confidentiality, but encryption depends on a key which, if compromised, allows the attacker to decrypt everything, effectively instantly. Security o
Externí odkaz:
http://arxiv.org/abs/2009.00086
Publikováno v:
Proceedings of the VLDB Endowment (PVLDB), 13(11): 2132-2145, 2020
A major algorithmic challenge in designing applications intended for secure remote execution is ensuring that they are oblivious to their inputs, in the sense that their memory access patterns do not leak sensitive information to the server. This pro
Externí odkaz:
http://arxiv.org/abs/2003.09481
Autor:
Stebila, Douglas
Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Yet security problems abound in electronic communication: spyware, phishing, denial of service, and side-channel attacks are still
Externí odkaz:
http://hdl.handle.net/10012/4295
Publikováno v:
Advances in Cryptology -- Proc. CRYPTO 2013, LNCS vol. 8043, pp. 344-360, Springer
One-time programs are modelled after a black box that allows a single evaluation of a function, and then self-destructs. Because software can, in principle, be copied, general one-time programs exists only in the hardware token model: it has been sho
Externí odkaz:
http://arxiv.org/abs/1211.1080
Key establishment is a crucial primitive for building secure channels: in a multi-party setting, it allows two parties using only public authenticated communication to establish a secret session key which can be used to encrypt messages. But if the s
Externí odkaz:
http://arxiv.org/abs/1206.6150
Autor:
Mosca, Michele, Stebila, Douglas
Publikováno v:
Error-Correcting Codes, Finite Geometries and Cryptography. Contemporary Mathematics, volume 523, pages 35-47. American Mathematical Society, 2010
One of the earliest cryptographic applications of quantum information was to create quantum digital cash that could not be counterfeited. In this paper, we describe a new type of quantum money: quantum coins, where all coins of the same denomination
Externí odkaz:
http://arxiv.org/abs/0911.1295
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, volume 36, page 283--296. Springer, 2010.
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information
Externí odkaz:
http://arxiv.org/abs/0902.2839
Autor:
Backendal, Matilda, Haller, Miro, Paterson, Kenny, Menezes, Alfred John, Stebila, Douglas, van Dijk, Marten
Publikováno v:
IEEE Security & Privacy; 2024, Vol. 22 Issue: 2 p69-74, 6p