Slide 95
Slide 95 text
References (1)
1. David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, et al.: “Imperfect Forward Secrecy:
How Diffie-Hellman Fails in Practice,” at 22nd ACM Conference on Computer and
Communications Security (CCS), October 2015. https://weakdh.org/imperfect-forward-
secrecy-ccs15.pdf
2. Nikita Borisov, Ian Goldberg, and Eric A Brewer: “Off-the-Record Communication, or, Why
Not To Use PGP,” at ACM Workshop on Privacy in the Electronic Society (WPES), October
2004. https://otr.cypherpunks.ca/otr-wpes.pdf
3. Tilman Frosch, Christian Mainka, Christoph Bader, et al.: “How Secure is TextSecure?,” at 1st
IEEE European Symposium on Security and Privacy (EuroS&P), March 2016. https://
eprint.iacr.org/2014/904
4. Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan:
“Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage,” at
25th USENIX Security Symposium, August 2016. https://www.usenix.org/conference/
usenixsecurity16/technical-sessions/presentation/garman
5. Hugo Krawczyk: “SIGMA: the “SIGn-and-MAc” Approach to Authenticated Diffie-Hellman
and its Use in the IKE Protocols,” at 23rd Annual International Cryptology Conference
(CRYPTO), August 2003. http://iacr.org/archive/crypto2003/27290399/27290399.pdf
6. Ben Laurie: “Certificate Transparency,” ACM Queue, volume 12, number 8, August 2014.
http://queue.acm.org/detail.cfm?id=2668154