Cryptology ePrint Archive: Report 2002/078

Available versions in chronological order


Provably Fixing the SSH Binary Packet Protocol
Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre

Provably Fixing the SSH Binary Packet Protocol
Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre

Provably Fixing the SSH Binary Packet Protocol
Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre

Provably Fixing the SSH Binary Packet Protocol
Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre

Provably Fixing the SSH Binary Packet Protocol
Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre

Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol
Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre
Publication Info: An extended abstract of this paper appears in Ninth ACM Conference on Computer and Communications Security, ACM, 2002. This is the full version.

Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol
Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre
Publication Info: An extended abstract of this paper appears in Ninth ACM Conference on Computer and Communications Security, ACM, 2002. This is the full version.

Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol
Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre
Publication Info: An extended abstract of this paper appears in Ninth ACM Conference on Computer and Communications Security, ACM, 2002. This is the full version.

Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol
Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre
Publication Info: An extended abstract of this paper appears in Ninth ACM Conference on Computer and Communications Security, ACM, 2002. This is the full version.

Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm
Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre
Publication Info: To appear in ACM Transactions on Information and System Security, ACM, 2004. An extended abstract of this paper appeared in Ninth ACM Conference on Computer and Communications Security, ACM, 2002.


[ Cryptology ePrint archive ]