Douglas Stebila

Orcid: 0000-0001-9443-3170

According to our database1, Douglas Stebila authored at least 106 papers between 2002 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Tight Multi-challenge Security Reductions for Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2025

ProofFrog: A Tool For Verifying Game-Hopping Proofs.
IACR Cryptol. ePrint Arch., 2025

FrodoKEM: A CCA-Secure Learning With Errors Key Encapsulation Mechanism.
IACR Commun. Cryptol., 2025

Hybrid Obfuscated Key Exchange and KEMs.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Verifiable Decapsulation: Recognizing Faulty Implementations of Post-quantum KEMs.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Falsifiability, Composability, and Comparability of Game-Based Security Models for Key Exchange Protocols.
Proceedings of the Information Security in a Connected World, 2025

2024
Security analysis of the iMessage PQ3 protocol.
IACR Cryptol. ePrint Arch., 2024

TurboTLS: TLS Connection Establishment with 1 Less Round Trip.
Proceedings of the Computer Security - ESORICS 2024, 2024

Obfuscated Key Exchange.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Quantum-Safe Account Recovery for WebAuthn.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
The Future of Digital Investigation: Automated Legal Inference.
IEEE Secur. Priv., 2023

A Formal Treatment of Distributed Key Generation, and New Constructions.
IACR Cryptol. ePrint Arch., 2023

TurboTLS: TLS connection establishment with 1 less round trip.
CoRR, 2023

Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation.
Proceedings of the Post-Quantum Cryptography - 14th International Workshop, 2023

Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
A reduction-based proof for authentication and session key security in three-party Kerberos.
Int. J. Appl. Cryptogr., 2022

Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Improving Software Quality in Cryptography Standardization Projects.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

A Tale of Two Models: Formal Verification of KEMTLS via Tamarin.
Proceedings of the Computer Security - ESORICS 2022, 2022

Proof-of-Possession for KEM Certificates using Verifiable Generation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications.
IACR Trans. Symmetric Cryptol., 2021

The Advanced Encryption Standard: 20 Years Later.
IEEE Secur. Priv., 2021

End-to-End Security: When Do We Have It?
IEEE Secur. Priv., 2021

Challenges in Cryptography.
IEEE Secur. Priv., 2021

Associative Blockchain for Decentralized PKI Transparency.
Cryptogr., 2021

The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

Post-quantum Key-Blinding for Authentication in Anonymity Networks.
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021

Improved Attacks Against Key Reuse in Learning with Errors Key Exchange.
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021

More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys.
Proceedings of the Computer Security - ESORICS 2021, 2021

SoK: Game-Based Security Models for Group Key Exchange.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
Protocols for Authentication and Key Establishment, Second Edition
Information Security and Cryptography, Springer, ISBN: 978-3-662-58145-2, 2020

Efficient Oblivious Database Joins.
Proc. VLDB Endow., 2020

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol.
IACR Cryptol. ePrint Arch., 2020

Towards Post-Quantum Security for Signal's X3DH Handshake.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

Benchmarking Post-quantum Cryptography in TLS.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

Post-Quantum TLS Without Handshake Signatures.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos.
IACR Cryptol. ePrint Arch., 2019

Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH.
IACR Cryptol. ePrint Arch., 2019

Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2019

Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

2017
Transitioning to a Quantum-Resistant Public Key Infrastructure.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

A Formal Security Analysis of the Signal Messaging Protocol.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Security Analysis of a Design Variant of Randomized Hashing.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
Secure modular password authentication for the web using channel bindings.
Int. J. Inf. Sec., 2016

A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
IACR Cryptol. ePrint Arch., 2016

Authenticated Network Time Synchronization.
Proceedings of the 25th USENIX Security Symposium, 2016

Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Secure Logging Schemes and Certificate Transparency.
Proceedings of the Computer Security - ESORICS 2016, 2016

From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

From Identification to Signatures, Tightly: A Framework and Generic Transforms.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Predicting TLS performance from key exchange performance: short paper.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2015
Double-Authentication-Preventing Signatures from Trapdoor Identification.
IACR Cryptol. ePrint Arch., 2015

An Analysis of TLS Handshake Proxying.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage.
Proceedings of the Financial Cryptography and Data Security, 2015

Protecting Encrypted Cookies from Compression Side-Channel Attacks.
Proceedings of the Financial Cryptography and Data Security, 2015

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Modelling Ciphersuite and Version Negotiation in the TLS Protocol.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Continuous After-the-fact Leakage-Resilient Key Exchange (full version).
IACR Cryptol. ePrint Arch., 2014

Secure Modular Password Authentication for the Web Using Channel Bindings.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Double-Authentication-Preventing Signatures.
Proceedings of the Computer Security - ESORICS 2014, 2014

Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Modelling after-the-fact leakage for key exchange.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Formalising Human Recognition: a Fundamental Building Block for Security Proofs.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

Continuous After-the-Fact Leakage-Resilient Key Exchange.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Multi-ciphersuite security and the SSH protocol.
IACR Cryptol. ePrint Arch., 2013

Quantum one-time programs.
IACR Cryptol. ePrint Arch., 2013

Anonymity and one-way authentication in key exchange protocols.
Des. Codes Cryptogr., 2013

Quantum Key Distribution in the Classical Authenticated Key Exchange Framework.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

Usability and Security of Gaze-Based Graphical Grid Passwords.
Proceedings of the Financial Cryptography and Data Security, 2013

ASICS: Authenticated Key Exchange Security Incorporating Certification Systems.
Proceedings of the Computer Security - ESORICS 2013, 2013

Quantum One-Time Programs - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Comparative eye tracking of experts and novices in web single sign-on.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

On the security of TLS renegotiation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Plaintext Awareness in Identity-Based Key Encapsulation.
IACR Cryptol. ePrint Arch., 2012

Analyzing the Effectiveness of Graph Metrics for Anomaly Detection in Online Social Networks.
Proceedings of the Web Information Systems Engineering - WISE 2012, 2012

Publicly Verifiable Ciphertexts.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Practical client puzzles in the standard model.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Effort-Release Public-Key Encryption from Cryptographic Puzzles.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
X.509v3 Certificates for Secure Shell Authentication.
RFC, March, 2011

Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Defending Web Services against Denial of Service Attacks Using Client Puzzles.
Proceedings of the IEEE International Conference on Web Services, 2011

Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

An integrated approach to cryptographic mitigation of denial-of-service attacks.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Reinforcing bad behaviour: the misuse of security indicators on popular websites.
Proceedings of the 22nd Australasian Computer-Human Interaction Conference, 2010

Fixed Argument Pairings.
Proceedings of the Progress in Cryptology, 2010

Multi-Factor Password-Authenticated Key Exchange.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010

One-Time-Password-Authenticated Key Exchange.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

Predicate-Based Key Exchange.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer.
RFC, December, 2009

Classical Authenticated Key Exchange and Quantum Cryptography.
PhD thesis, 2009

The Case for Quantum Key Distribution.
Proceedings of the Quantum Communication and Quantum Networking, 2009

Towards Denial-of-Service-Resilient Key Agreement Protocols.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2006
Unified Point Addition Formulæ and Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

2004
Integrating elliptic curve cryptography into the web's security infrastructure.
Proceedings of the 13th international conference on World Wide Web, 2004

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography.
Proceedings of the Network and Distributed System Security Symposium, 2004

2003
Generic GF(2) Arithmetic in Software and Its Application to ECC.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Performance analysis of elliptic curve cryptography for SSL.
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002

An End-to-End Systems Approach to Elliptic Curve Cryptography.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002


  Loading...