Benjamin Dowling
Benjamin Dowling
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
A formal security analysis of the signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
Journal of Cryptology 33 (4), 1914-1983, 2020
2602020
A cryptographic analysis of the TLS 1.3 handshake protocol candidates
B Dowling, M Fischlin, F Günther, D Stebila
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1252015
Secure logging schemes and certificate transparency
B Dowling, F Günther, U Herath, D Stebila
European Symposium on Research in Computer Security, 140-158, 2016
462016
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
B Dowling, M Fischlin, F Günther, D Stebila
IACR Cryptol. ePrint Arch. 2016, 81, 2016
442016
Multi-ciphersuite security of the Secure Shell (SSH) protocol
F Bergsma, B Dowling, F Kohlar, J Schwenk, D Stebila
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
392014
Authenticated network time synchronization
B Dowling, D Stebila, G Zaverucha
25th {USENIX} Security Symposium ({USENIX} Security 16), 823-840, 2016
332016
A cryptographic analysis of the WireGuard protocol
B Dowling, KG Paterson
International Conference on Applied Cryptography and Network Security, 3-21, 2018
292018
Identity confidentiality in 5G mobile telephony systems
H Khan, B Dowling, KM Martin
International Conference on Research in Security Standardisation, 120-142, 2018
222018
Modelling ciphersuite and version negotiation in the TLS protocol
B Dowling, D Stebila
Australasian Conference on Information Security and Privacy, 270-288, 2015
182015
A cryptographic analysis of the TLS 1.3 handshake protocol
B Dowling, M Fischlin, F Günther, D Stebila
Journal of Cryptology 34 (4), 1-69, 2021
162021
Highly efficient privacy-preserving key agreement for wireless body area networks
H Khan, B Dowling, KM Martin
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
102018
Provable security of internet protocols
BJ Dowling
Queensland University of Technology, 2017
82017
There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging.
B Dowling, B Hale
IACR Cryptol. ePrint Arch. 2020, 541, 2020
62020
Flexible authenticated and confidential channel establishment (fACCE): Analyzing the Noise protocol framework
B Dowling, P Rösler, J Schwenk
Public-Key Cryptography–PKC 2020 12100, 341-373, 2020
62020
Multi-ciphersuite security and the SSH protocol.
B Dowling, F Giesen, F Kohlar, J Schwenk, D Stebila
IACR Cryptol. ePrint Arch. 2013, 813, 2013
42013
A formal analysis of the signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
IEEE, 2017
32017
Many a mickle makes a muckle: A framework for provably quantum-secure hybrid key exchange
B Dowling, TB Hansen, KG Paterson
International Conference on Post-Quantum Cryptography, 483-502, 2020
22020
ANTP: Authenticated NTP Implementation Specification
B Dowling, D Stebila, G Zaverucha
Microsoft Research Technical Report, MSR-TR-2015-19, 2015. http://research …, 0
1
Secure Messaging Authentication against Active Man-in-the-Middle Attacks
B Dowling, B Hale
6th IEEE European Symposium on Security and Privacy, 2021
2021
Pragmatic Authenticated Key Agreement for IEEE Std 802.15. 6.
H Khan, B Dowling, KM Martin
IACR Cryptol. ePrint Arch. 2020, 45, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20