Benjamin Dowling
Benjamin Dowling
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
A formal security analysis of the signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
Journal of Cryptology 33 (4), 1914-1983, 2020
1812020
A cryptographic analysis of the TLS 1.3 handshake protocol candidates
B Dowling, M Fischlin, F Günther, D Stebila
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
992015
Secure logging schemes and certificate transparency
B Dowling, F Günther, U Herath, D Stebila
European Symposium on Research in Computer Security, 140-158, 2016
432016
Multi-ciphersuite security of the Secure Shell (SSH) protocol
F Bergsma, B Dowling, F Kohlar, J Schwenk, D Stebila
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
362014
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
B Dowling, M Fischlin, F Günther, D Stebila
IACR Cryptol. ePrint Arch. 2016, 81, 2016
342016
Authenticated network time synchronization
B Dowling, D Stebila, G Zaverucha
25th {USENIX} Security Symposium ({USENIX} Security 16), 823-840, 2016
292016
A cryptographic analysis of the WireGuard protocol
B Dowling, KG Paterson
International Conference on Applied Cryptography and Network Security, 3-21, 2018
192018
Modelling ciphersuite and version negotiation in the TLS protocol
B Dowling, D Stebila
Australasian Conference on Information Security and Privacy, 270-288, 2015
132015
Identity confidentiality in 5g mobile telephony systems
H Khan, B Dowling, KM Martin
International Conference on Research in Security Standardisation, 120-142, 2018
92018
Provable security of internet protocols
BJ Dowling
Queensland University of Technology, 2017
82017
Highly efficient privacy-preserving key agreement for wireless body area Networks
H Khan, B Dowling, KM Martin
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
52018
Multi-ciphersuite security and the SSH protocol.
B Dowling, F Giesen, F Kohlar, J Schwenk, D Stebila
IACR Cryptol. ePrint Arch. 2013, 813, 2013
42013
Flexible authenticated and confidential channel establishment (fACCE): Analyzing the Noise protocol framework
B Dowling, P Rösler, J Schwenk
IACR International Conference on Public-Key Cryptography, 341-373, 2020
22020
A formal analysis of the signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
IEEE, 2017
22017
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange
B Dowling, TB Hansen, KG Paterson
International Conference on Post-Quantum Cryptography, 483-502, 2020
12020
A cryptographic analysis of the TLS 1.3 handshake protocol
B Dowling, M Fischlin, F Günther, D Stebila
Journal of Cryptology, 2020
12020
A Formal Security Analysis of Key Establishment in the Signal Messaging Protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
Journal of Cryptology, 2020
12020
ANTP: Authenticated NTP Implementation Specification
B Dowling, D Stebila, G Zaverucha
Microsoft Research Technical Report, MSR-TR-2015-19, 2015. http://research …, 0
1
There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging.
B Dowling, B Hale
IACR Cryptol. ePrint Arch. 2020, 541, 2020
2020
Pragmatic Authenticated Key Agreement for IEEE Std 802.15. 6.
H Khan, B Dowling, KM Martin
IACR Cryptol. ePrint Arch. 2020, 45, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20