Attacking the IPsec standards in encryption-only configurations JP Degabriele, KG Paterson 2007 IEEE Symposium on Security and Privacy (SP'07), 335-349, 2007 | 98 | 2007 |
On the (in) security of IPsec in MAC-then-encrypt configurations JP Degabriele, KG Paterson Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 95 | 2010 |
On the joint security of encryption and signature in EMV JP Degabriele, A Lehmann, KG Paterson, NP Smart, M Strefler Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012 | 76 | 2012 |
A more cautious approach to security against mass surveillance JP Degabriele, P Farshim, B Poettering Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015 | 70 | 2015 |
Provable security in the real world JP Degabriele, K Paterson, G Watson IEEE Security & Privacy 9 (3), 33-41, 2010 | 55 | 2010 |
Security of symmetric encryption in the presence of ciphertext fragmentation A Boldyreva, JP Degabriele, KG Paterson, M Stam Annual International Conference on the Theory and Applications of …, 2012 | 54 | 2012 |
Backdoors in pseudorandom number generators: Possibility and impossibility results JP Degabriele, KG Paterson, JCN Schuldt, J Woodage Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016 | 53 | 2016 |
On symmetric encryption with distinguishable decryption failures A Boldyreva, JP Degabriele, KG Paterson, M Stam Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014 | 51 | 2014 |
A surfeit of SSH cipher suites MR Albrecht, JP Degabriele, TB Hansen, KG Paterson Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 44 | 2016 |
Sponges resist leakage: The case of authenticated encryption JP Degabriele, C Janson, P Struck International Conference on the Theory and Application of Cryptology and …, 2019 | 37 | 2019 |
Economic aspects of a utility computing service JP Degabriele, D Pym 1st International ICST Workshop on Utility computing enhanced with high bit …, 2007 | 30 | 2007 |
The security of ChaCha20-Poly1305 in the multi-user setting JP Degabriele, J Govinden, F Günther, KG Paterson Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 17 | 2021 |
Untagging tor: a formal treatment of onion encryption JP Degabriele, M Stam Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018 | 14 | 2018 |
Unpicking PLAID: A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol JP Degabriele, V Fehr, M Fischlin, T Gagliardoni, F Günther, GA Marson, ... Security Standardisation Research: First International Conference, SSR 2014 …, 2014 | 13 | 2014 |
Simulatable channels: Extended security that is universally composable and easier to prove JP Degabriele, M Fischlin Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 9 | 2018 |
Hiding the lengths of encrypted messages via Gaussian padding JP Degabriele Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 6 | 2021 |
Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels JP Degabriele, V Karadžić Annual International Cryptology Conference, 264-295, 2022 | 5 | 2022 |
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol JP Degabriele, V Fehr, M Fischlin, T Gagliardoni, F Günther, GA Marson, ... International Journal of Information Security 15 (6), 637-657, 2016 | 5 | 2016 |
Authenticated Encryption in Theory and in Practice J Degabriele Royal Holloway, University of London, 2014 | 4 | 2014 |
The indifferentiability of the duplex and its practical applications JP Degabriele, M Fischlin, J Govinden International Conference on the Theory and Application of Cryptology and …, 2023 | 3 | 2023 |