A surfeit of SSH cipher suites MR Albrecht, JP Degabriele, TB Hansen, KG Paterson Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 44 | 2016 |
On the information ratio of non-perfect secret sharing schemes O Farràs, TB Hansen, T Kaced, C Padró Algorithmica 79, 987-1013, 2017 | 41 | 2017 |
Many a mickle makes a muckle: A framework for provably quantum-secure hybrid key exchange B Dowling, TB Hansen, KG Paterson International Conference on Post-Quantum Cryptography, 483-502, 2020 | 26 | 2020 |
Optimal non-perfect uniform secret sharing schemes O Farras, T Hansen, T Kaced, C Padró Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 23 | 2014 |
Post-quantum hybrid key exchange in SSH P Kampanakis, D Stebila, T Hansen Internet Engineering Task Force, Internet-Draft draft-kampanakis-curdle-ssh …, 2023 | 10 | 2023 |
Post-quantum public key algorithms for the Secure Shell (SSH) protocol P Kampanakis, D Stebila, M Friedl, T Hansen, D Sikeridis Internet Engineering Task Force, Internet-Draftdraft-kampanakis-curdle-pq-ssh-00, 2020 | 8 | 2020 |
Cryptographic Security of SSH Encryption Schemes TB Hansen Royal Holloway, University of London, 2020 | 2 | 2020 |
libintermac: Beyond confidentiality and integrity in practice MR Albrecht, TB Hansen, KG Paterson IACR Transactions on Symmetric Cryptology, 46-83, 2019 | 2 | 2019 |
Formal Verification of Cryptographic Software at AWS-Current Practices and Future Trends R Chapman, A Petcher, T Hansen, Y Peng, T Lepoint, C Bytheway, ... | | 2024 |
Formal verification L de Moura, J Lee, H Becker, J Harrison, R Chapman, A Petcher, ... Policy, 2023 | | 2023 |
On a Canonical and Systematic Approach to Cryptographic Subversion TB Hansen Aarhus Universitet, Institut for Matematik, 2015 | | 2015 |