Douglas Stebila
Orcid: 0000-0001-9443-3170
According to our database1,
Douglas Stebila
authored at least 106 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Commun. Cryptol., 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Falsifiability, Composability, and Comparability of Game-Based Security Models for Key Exchange Protocols.
Proceedings of the Information Security in a Connected World, 2025
2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEEE Secur. Priv., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Post-Quantum Cryptography - 14th International Workshop, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
A reduction-based proof for authentication and session key security in three-party Kerberos.
Int. J. Appl. Cryptogr., 2022
Proceedings of the Public-Key Cryptography - PKC 2022, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
2020
Information Security and Cryptography, Springer, ISBN: 978-3-662-58145-2, 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019
2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
2016
Int. J. Inf. Sec., 2016
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the Australasian Computer Science Week Multiconference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security Standardisation Research - First International Conference, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Des. Codes Cryptogr., 2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Analyzing the Effectiveness of Graph Metrics for Anomaly Detection in Online Social Networks.
Proceedings of the Web Information Systems Engineering - WISE 2012, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the IEEE International Conference on Web Services, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the 22nd Australasian Computer-Human Interaction Conference, 2010
Proceedings of the 8th Australasian Information Security Conference 2010, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
RFC, December, 2009
Proceedings of the Quantum Communication and Quantum Networking, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
2004
Proceedings of the 13th international conference on World Wide Web, 2004
Proceedings of the Network and Distributed System Security Symposium, 2004
2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002