Douglas Stebila

Orcid: 0000-0001-9443-3170

According to our database1, Douglas Stebila authored at least 97 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security analysis of the iMessage PQ3 protocol.
IACR Cryptol. ePrint Arch., 2024

2023
The Future of Digital Investigation: Automated Legal Inference.
IEEE Secur. Priv., 2023

Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements.
IACR Cryptol. ePrint Arch., 2023

A Formal Treatment of Distributed Key Generation, and New Constructions.
IACR Cryptol. ePrint Arch., 2023

TurboTLS: TLS connection establishment with 1 less round trip.
CoRR, 2023

Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation.
Proceedings of the Post-Quantum Cryptography - 14th International Workshop, 2023

2022
A reduction-based proof for authentication and session key security in three-party Kerberos.
Int. J. Appl. Cryptogr., 2022

Improving Software Quality in Cryptography Standardization Projects.
IACR Cryptol. ePrint Arch., 2022

Proof-of-possession for KEM certificates using verifiable generation.
IACR Cryptol. ePrint Arch., 2022

A tale of two models: formal verification of KEMTLS via Tamarin.
IACR Cryptol. ePrint Arch., 2022

2021
Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications.
IACR Trans. Symmetric Cryptol., 2021

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol.
J. Cryptol., 2021

The Advanced Encryption Standard: 20 Years Later.
IEEE Secur. Priv., 2021

End-to-End Security: When Do We Have It?
IEEE Secur. Priv., 2021

Challenges in Cryptography.
IEEE Secur. Priv., 2021

More efficient post-quantum KEMTLS with pre-distributed public keys.
IACR Cryptol. ePrint Arch., 2021

SoK: Game-based Security Models for Group Key Exchange.
IACR Cryptol. ePrint Arch., 2021

Post-Quantum Key-Blinding for Authentication in Anonymity Networks.
IACR Cryptol. ePrint Arch., 2021

The "quantum annoying" property of password-authenticated key exchange protocols.
IACR Cryptol. ePrint Arch., 2021

Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.
IACR Cryptol. ePrint Arch., 2021

Associative Blockchain for Decentralized PKI Transparency.
Cryptogr., 2021

2020
Protocols for Authentication and Key Establishment, Second Edition
Information Security and Cryptography, Springer, ISBN: 978-3-662-58145-2, 2020

Efficient Oblivious Database Joins.
Proc. VLDB Endow., 2020

A Formal Security Analysis of the Signal Messaging Protocol.
J. Cryptol., 2020

Post-quantum TLS without handshake signatures.
IACR Cryptol. ePrint Arch., 2020

Improved attacks against key reuse in learning with errors key exchange.
IACR Cryptol. ePrint Arch., 2020

Towards Post-Quantum Security for Signal's X3DH Handshake.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

2019
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos.
IACR Cryptol. ePrint Arch., 2019

Benchmarking Post-Quantum Cryptography in TLS.
IACR Cryptol. ePrint Arch., 2019

Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH.
IACR Cryptol. ePrint Arch., 2019

Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2019

2018
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2018

2017
Double-authentication-preventing signatures.
Int. J. Inf. Sec., 2017

ASICS: authenticated key exchange security incorporating certification systems.
Int. J. Inf. Sec., 2017

Transitioning to a Quantum-Resistant Public Key Infrastructure.
IACR Cryptol. ePrint Arch., 2017

Security Analysis of a Design Variant of Randomized Hashing.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
Secure modular password authentication for the web using channel bindings.
Int. J. Inf. Sec., 2016

Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project.
IACR Cryptol. ePrint Arch., 2016

Secure Logging Schemes and Certificate Transparency.
IACR Cryptol. ePrint Arch., 2016

A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
IACR Cryptol. ePrint Arch., 2016

Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters.
IACR Cryptol. ePrint Arch., 2016

Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE.
IACR Cryptol. ePrint Arch., 2016

Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures.
IACR Cryptol. ePrint Arch., 2016

From Identification to Signatures, Tightly: A Framework and Generic Transforms.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Predicting TLS performance from key exchange performance: short paper.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2015
Authenticated Network Time Synchronization.
IACR Cryptol. ePrint Arch., 2015

Modelling ciphersuite and version negotiation in the TLS protocol.
IACR Cryptol. ePrint Arch., 2015

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
IACR Cryptol. ePrint Arch., 2015

From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
IACR Cryptol. ePrint Arch., 2015

Double-Authentication-Preventing Signatures from Trapdoor Identification.
IACR Cryptol. ePrint Arch., 2015

Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange.
IACR Cryptol. ePrint Arch., 2015

An Analysis of TLS Handshake Proxying.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Plaintext awareness in identity-based key encapsulation.
Int. J. Inf. Sec., 2014

Secure modular password authentication for the web using channel bindings.
IACR Cryptol. ePrint Arch., 2014

Hierarchical deterministic Bitcoin wallets that tolerate key leakage.
IACR Cryptol. ePrint Arch., 2014

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem.
IACR Cryptol. ePrint Arch., 2014

Protecting Encrypted Cookies from Compression Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2014

Modelling After-the-fact Leakage for Key Exchange.
IACR Cryptol. ePrint Arch., 2014

Continuous After-the-fact Leakage-Resilient Key Exchange (full version).
IACR Cryptol. ePrint Arch., 2014

Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Formalising Human Recognition: a Fundamental Building Block for Security Proofs.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

Continuous After-the-Fact Leakage-Resilient Key Exchange.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Multi-ciphersuite security and the SSH protocol.
IACR Cryptol. ePrint Arch., 2013

Quantum one-time programs.
IACR Cryptol. ePrint Arch., 2013

Anonymity and one-way authentication in key exchange protocols.
Des. Codes Cryptogr., 2013

Usability and Security of Gaze-Based Graphical Grid Passwords.
Proceedings of the Financial Cryptography and Data Security, 2013

Quantum One-Time Programs - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Comparative eye tracking of experts and novices in web single sign-on.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Publicly Verifiable Ciphertexts.
IACR Cryptol. ePrint Arch., 2012

Quantum Key Distribution in the Classical Authenticated Key Exchange Framework.
IACR Cryptol. ePrint Arch., 2012

On the Security of TLS Renegotiation.
IACR Cryptol. ePrint Arch., 2012

Analyzing the Effectiveness of Graph Metrics for Anomaly Detection in Online Social Networks.
Proceedings of the Web Information Systems Engineering - WISE 2012, 2012

Practical client puzzles in the standard model.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Effort-Release Public-Key Encryption from Cryptographic Puzzles.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
X.509v3 Certificates for Secure Shell Authentication.
RFC, March, 2011

Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection.
IACR Cryptol. ePrint Arch., 2011

Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Defending Web Services against Denial of Service Attacks Using Client Puzzles.
Proceedings of the IEEE International Conference on Web Services, 2011

An integrated approach to cryptographic mitigation of denial-of-service attacks.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols.
IACR Cryptol. ePrint Arch., 2010

Fixed Argument Pairings.
IACR Cryptol. ePrint Arch., 2010

Predicate-Based Key Exchange.
IACR Cryptol. ePrint Arch., 2010

Reinforcing bad behaviour: the misuse of security indicators on popular websites.
Proceedings of the 22nd Australasian Computer-Human Interaction Conference, 2010

2009
Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer.
RFC, December, 2009

Classical Authenticated Key Exchange and Quantum Cryptography.
PhD thesis, 2009

The Case for Quantum Key Distribution.
IACR Cryptol. ePrint Arch., 2009

One-time-password-authenticated key exchange.
IACR Cryptol. ePrint Arch., 2009

Towards Denial-of-Service-Resilient Key Agreement Protocols.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Multi-Factor Password-Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2008

2005
Unified Point Addition Formulæ and Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2005

2004
Integrating elliptic curve cryptography into the web's security infrastructure.
Proceedings of the 13th international conference on World Wide Web, 2004

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography.
Proceedings of the Network and Distributed System Security Symposium, 2004

2003
Generic GF(2) Arithmetic in Software and Its Application to ECC.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Performance analysis of elliptic curve cryptography for SSL.
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002

An End-to-End Systems Approach to Elliptic Curve Cryptography.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002


  Loading...