On the Security of the Pre-shared Key Ciphersuites of TLS

TLS is by far the most important protocol on the Internet for negotiating secure session keys and providing authentication. Only very recently, the standard ciphersuites of TLS have been shown to provide provably secure guarantees under a new notion calle

  • PDF / 8,510,695 Bytes
  • 699 Pages / 439.37 x 666.142 pts Page_size
  • 9 Downloads / 132 Views

DOWNLOAD

REPORT


Hugo Krawczyk (Ed.)

Public-Key Cryptography – PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography Buenos Aires, Argentina, March 26–28, 2014, Proceedings

123

Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany

8383

Hugo Krawczyk (Ed.)

Public-Key Cryptography – PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography Buenos Aires, Argentina, March 26-28, 2014 Proceedings

13

Volume Editor Hugo Krawczyk IBM T.J.Watson Research Center 1101 Kitchawan Road, Yorktown Heights, NY 10598, USA E-mail: [email protected]

ISSN 0302-9743 e-ISSN 1611-3349 ISBN 978-3-642-54630-3 e-ISBN 978-3-642-54631-0 DOI 10.1007/978-3-642-54631-0 Springer Heidelberg New York Dordrecht London Library of Congress Control Number: 2014932835 CR Subject Classification (1998): LNCS Sublibrary: SL 4 – Security and Cryptology © International Association for Cryptologic Research 2014 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in ist current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a s