aboutsummaryrefslogtreecommitdiffstats
path: root/my.bib
blob: e9b78d0f997af76dd442f3e42eca9d96138c699e (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
@inproceedings{Rogaway:2002,
 author = {Rogaway, Phillip},
 title = "{Authenticated-encryption with Associated-data}",
 booktitle = "{Proceedings of the 9th {ACM} Conference on Computer and Communications Security}",
 series = {CCS '02},
 year = {2002},
 isbn = {1-58113-612-9},
 location = {Washington, DC, USA},
 doi = {10.1145/586110.586125},
 acmid = {586125},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {OCB, associated-data problem, authenticated-encryption, block-cipher usage, key separation, modes of operation},
 url="http://web.cs.ucdavis.edu/~rogaway/papers/ad.pdf"
} 


@misc{rfc7748,
  author="A. Langley and M. Hamburg and S. Turner",
  title="{Elliptic Curves for Security}",
  series="Request for Comments",
  number="7748",
  howpublished="RFC 7748 (Informational)",
  publisher="IETF",
  organization="Internet Engineering Task Force",
  year=2016,
  month=jan,
    url="http://www.ietf.org/rfc/rfc7748.txt",
}

@misc{rfc2104,
  author="H. Krawczyk and M. Bellare and R. Canetti",
  title="{HMAC: Keyed-Hashing for Message Authentication}",
  series="Request for Comments",
  number="2104",
  howpublished="RFC 2104 (Informational)",
  publisher="IETF",
  organization="Internet Engineering Task Force",
  year=1997,
  month=feb,
    note="Updated by RFC 6151",
  url="http://www.ietf.org/rfc/rfc2104.txt",
}

@misc{rfc5869,
  author="H. Krawczyk and P. Eronen",
  title="{HMAC-based Extract-and-Expand Key Derivation Function (HKDF)}",
  series="Request for Comments",
  number="5869",
  howpublished="RFC 5869 (Informational)",
  publisher="IETF",
  organization="Internet Engineering Task Force",
  year=2010,
  month=may,
    url="http://www.ietf.org/rfc/rfc5869.txt",
}

@misc{hkdfpaper,
    author = {Hugo Krawczyk},
    title = {"Cryptographic Extraction and Key Derivation: The HKDF Scheme"},
    howpublished = {Cryptology ePrint Archive, Report 2010/264},
    year = {2010},
    url="http://eprint.iacr.org/2010/264",
}

@misc{elligator,
    author = {Daniel J. Bernstein and Mike Hamburg and Anna Krasnova and Tanja Lange},
    title = "{Elligator: Elliptic-curve points indistinguishable from uniform random strings}",
    howpublished = {Cryptology ePrint Archive, Report 2013/325},
    year = {2013},
    url = "http://eprint.iacr.org/2013/325",
}

@misc{rfc7539,
  author="Y. Nir and A. Langley",
  title="{ChaCha20 and Poly1305 for IETF Protocols}",
  series="Request for Comments",
  number="7539",
  howpublished="RFC 7539 (Informational)",
  publisher="IETF",
  organization="Internet Engineering Task Force",
  year=2015,
  month=may,
    url="http://www.ietf.org/rfc/rfc7539.txt",
}

@techreport{nistgcm,
 author = {Dworkin, Morris J.},
 title = "{SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC}",
 year = {2007},
 publisher = {National Institute of Standards \& Technology},
 address = {Gaithersburg, MD, United States},
 url="http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf"
} 

@TechReport{nistsha2,
  author =       "NIST",
  key =          "FIPS-180-4",
  title =        "{FIPS 180-4.  Secure Hash Standard (SHS)}",
  publisher = {National Institute of Standards \& Technology},
  address = {Gaithersburg, MD, United States},
  year =         "2012",
  URL =          "http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf"
}

@misc{rfc7693,

  author="M-J. Saarinen and J-P. Aumasson",
  title="{The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC)}",
  series="Request for Comments",
  number="7693",
  howpublished="RFC 7693 (Informational)",
  publisher="IETF",
  organization="Internet Engineering Task Force",
  year=2015,
  month=nov,
    url="http://www.ietf.org/rfc/rfc7693.txt",
}

@misc{nacl,
  author="Daniel J. Bernstein and Tanja Lange and Peter Schwabe",
  title="{NaCl: Networking and Cryptography Library}",
  url="https://nacl.cr.yp.to/"
}

@misc{curvecp,
  author="Daniel J. Bernstein",
  title="{CurveCP: Usable security for the Internet}",
  url="https://curvecp.org"
}

@Inbook{sigma,
author="Krawczyk, Hugo",
title="{SIGMA: The `SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols}",
bookTitle="{Advances in Cryptology - CRYPTO 2003}",
year="2003",
url="http://webee.technion.ac.il/~hugo/sigma.html"
}

@misc{homqv,
    author = {Shai Halevi and Hugo Krawczyk},
    title = "{One-Pass HMQV and Asymmetric Key-Wrapping}",
    howpublished = {Cryptology ePrint Archive, Report 2010/638},
    year = {2010},
    url = {http://eprint.iacr.org/2010/638},
}

@article{ntor,
 author = {Goldberg, Ian and Stebila, Douglas and Ustaoglu, Berkant},
 title = "{Anonymity and One-way Authentication in Key Exchange Protocols}",
 journal = {Design, Codes, and Cryptography},
 issue_date = {May       2013},
 volume = {67},
 number = {2},
 month = may,
 year = {2013},
 issn = {0925-1022},
 numpages = {25},
 doi = {10.1007/s10623-011-9604-z},
 acmid = {2458069},
 publisher = {Kluwer Academic Publishers},
 address = {Norwell, MA, USA},
 url="http://cacr.uwaterloo.ca/techreports/2011/cacr2011-11.pdf"
}

@inproceedings{otr,
 author = {Di Raimondo, Mario and Gennaro, Rosario and Krawczyk, Hugo},
 title = "{Secure Off-the-record Messaging}",
 booktitle = "{Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society}",
 series = {WPES '05},
 year = {2005},
 isbn = {1-59593-228-3},
 address = {New York, NY, USA},
 url="http://www.dmi.unict.it/diraimondo/web/wp-content/uploads/papers/otr.pdf"
} 

@Inbook{kudla2005,
author="Kudla, Caroline and Paterson, Kenneth G.",
title="{Modular Security Proofs for Key Agreement Protocols}",
bookTitle="{Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security}",
year="2005",
isbn="978-3-540-32267-2",
doi="10.1007/11593447_30",
url="http://www.isg.rhul.ac.uk/~kp/ModularProofs.pdf"
}

@Inbook{blakewilson1997,
author="Blake-Wilson, Simon and Johnson, Don and Menezes, Alfred",
title="Key agreement protocols and their security analysis",
bookTitle="{Crytography and Coding: 6th IMA International Conference Cirencester, UK, December 17--19, 1997 Proceedings}",
year="1997",
url="http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.387"
}

@inproceedings{gapdh,
 author = "{Okamoto, Tatsuaki and Pointcheval, David}",
 title = "{The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes}",
 booktitle = "{Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography}",
 series = {PKC '01},
 year = {2001},
 isbn = {3-540-41658-7},
 url = "https://www.di.ens.fr/~pointche/Documents/Papers/2001_pkc.pdf",
 publisher = {Springer-Verlag},
 address = {London, UK, UK},
} 

@online{doubleratchet,
 author                = {Trevor Perrin and Moxie Marlinspike},
 year                  = {2016},
 title                 = "{The Double Ratchet Algorithm}",
 url                   = "https://whispersystems.org/docs/specifications/doubleratchet/"
}

@misc{moderncryptostrobe,
 author                = {Mike Hamburg},
 year                  = {2015},
 title                 = "{Key Exchange and DuplexWrap-like protocols}",
 howpublished          = "Noise@moderncrypto.org Mailing List",
 url                   = "https://moderncrypto.org/mail-archive/noise/2015/000098.html"
}
https://moderncrypto.org/mail-archive/noise/2015/000098.html


@misc{strobe,
    author = "{Mike Hamburg}",
    title = "{The STROBE protocol framework}",
    howpublished = {Cryptology ePrint Archive, Report 2017/003},
    year = {2017},
    url = "http://eprint.iacr.org/2017/003",
}

@misc{book1,
    author = "{Trevor Perrin}",
    title = "{The Noise Protocol Framework: Book 1}",
    year = {2017},
    url = "https://noiseprotocol.org/noise_book1.pdf",
}

@misc{book2,
    author = "{Trevor Perrin}",
    title = "{The Noise Protocol Framework: Book 2}",
    year = {2017},
    url = "https://noiseprotocol.org/noise_book2.pdf",
}