Subject: Computer Science - Cryptography and Security
TLS is the most widely used cryptographic protocol on the Internet. While many recent studies focused on its use in HTTPS, none so far analyzed TLS usage in e-mail related protocols, which often carry highly sensitive information. Since end-to-end encryption mechanisms ... View more
 Applied Crypto Hardening. Online at https://bettercrypto.org, 2015.
 D. Adrian, K. Bhargavan, Z. Durumeric, P. Gaudry, M. Green, J. A. Halderman, N. Heninger, D. Springall, E. Thome´, L. Valenta, B. VanderSloot, E. Wustrow, S. Zanella-Be´guelin, , and P. Zimmermann. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. In 22nd ACM Conference on Computer and Communications Security, Oct. 2015.
 N. J. Al Fardan and K. G. Paterson. Lucky thirteen: Breaking the tls and dtls record protocols. In Security and Privacy (SP), 2013 IEEE Symposium on, pages 526-540. IEEE, 2013.
 N. J. AlFardan, D. J. Bernstein, K. G. Paterson, B. Poettering, and J. C. Schuldt. On the Security of RC4 in TLS. In 22nd USENIX Security Symposium, pages 305-320, 2013.
 B. Amann, M. Vallentin, S. Hall, and R. Sommer. Extracting Certificates from Live Traffic: A Near Real-Time SSL Notary Service. Technical Report TR-12-014, ICSI, Nov. 2012.
 B. Amann, M. Vallentin, S. Hall, and R. Sommer. Revisiting SSL: A Large-Scale Study of the Internet's Most Trusted Protocol. Technical Report TR-12-015, ICSI, Dec. 2012.
 M. Avalle, A. Pironti, and R. Sisto. Formal Verification of Security Protocol Implementations: A Survey. Formal Aspects of Computing, 26(1):99-123, 2014.
 B. Beurdouche, K. Bhargavan, A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, A. Pironti, P.-Y. Strub, and J. K. Zinzindohoue. A Messy State of the Union: Taming the Composite State Machines of TLS. In IEEE Symposium on Security and Privacy, 2015.
 K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, and P. Strub. Implementing TLS with Verified Cryptographic Security. In IEEE Symposium on Security and Privacy, pages 445-459, 2013.
 S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, and B. Moeller. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). RFC 4492 (Informational), May 2006. Updated by RFCs 5246, 7027.