What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Douglas Stebila
Google Scholar
ORCID:
0000-0001-9443-3170
57
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
Verifiable Decapsulation: Recognizing Faulty Implementations of Post-quantum KEMs.
Lewis Glabush
Felix Günther
Kathrin Hövelmanns
Douglas Stebila
2025
conf/crypto
Hybrid Obfuscated Key Exchange and KEMs.
Felix Günther
Michael Rosenberg
Douglas Stebila
Shannon Veitch
2025
journals/cic
FrodoKEM: A CCA-Secure Learning With Errors Key Encapsulation Mechanism.
Lewis Glabush
Patrick Longa
Michael Naehrig
Chris Peikert
Douglas Stebila
Fernando Virdia
2024
conf/ccs
Obfuscated Key Exchange.
Felix Günther
Douglas Stebila
Shannon Veitch
2024
conf/esorics
TurboTLS: TLS Connection Establishment with 1 Less Round Trip.
Carlos Aguilar Melchor
Thomas Bailleux
Jason Goertzen
Adrien Guinet
David Joseph
Douglas Stebila
2024
conf/asiaccs
Quantum-Safe Account Recovery for WebAuthn.
Douglas Stebila
Spencer Wilson
2023
conf/esorics
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements.
Marcel Tiepelt
Edward Eaton
Douglas Stebila
2022
conf/ccs
Proof-of-Possession for KEM Certificates using Verifiable Generation.
Tim Güneysu
Philip W. Hodges
Georg Land
Mike Ounsworth
Douglas Stebila
Greg Zaverucha
2022
conf/eurosp
Improving Software Quality in Cryptography Standardization Projects.
Matthias J. Kannwischer
Peter Schwabe
Douglas Stebila
Thom Wiggers
2022
conf/esorics
A Tale of Two Models: Formal Verification of KEMTLS via Tamarin.
Sofía Celi
Jonathan Hoyland
Douglas Stebila
Thom Wiggers
2022
conf/pkc
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.
Jacqueline Brendel
Rune Fiedler
Felix Günther
Christian Janson
Douglas Stebila
2021
journals/tosc
Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications.
Philip W. Hodges
Douglas Stebila
2021
journals/joc
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol.
Benjamin Dowling
Marc Fischlin
Felix Günther
Douglas Stebila
2021
conf/latincrypt
Post-quantum Key-Blinding for Authentication in Anonymity Networks.
Edward Eaton
Douglas Stebila
Roy Stracovsky
2021
conf/latincrypt
Improved Attacks Against Key Reuse in Learning with Errors Key Exchange.
Nina Bindel
Douglas Stebila
Shannon Veitch
2021
conf/esorics
More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys.
Peter Schwabe
Douglas Stebila
Thom Wiggers
2021
conf/ctrsa
SoK: Game-Based Security Models for Group Key Exchange.
Bertram Poettering
Paul Rösler
Jörg Schwenk
Douglas Stebila
2020
journals/joc
A Formal Security Analysis of the Signal Messaging Protocol.
Katriel Cohn-Gordon
Cas Cremers
Benjamin Dowling
Luke Garratt
Douglas Stebila
2020
conf/ccs
Post-Quantum TLS Without Handshake Signatures.
Peter Schwabe
Douglas Stebila
Thom Wiggers
2020
conf/esorics
ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work.
Moe Sabry
Reza Samavi
Douglas Stebila
2020
conf/sacrypt
Towards Post-Quantum Security for Signal's X3DH Handshake.
Jacqueline Brendel
Marc Fischlin
Felix Günther
Christian Janson
Douglas Stebila
2017
conf/eurosp
A Formal Security Analysis of the Signal Messaging Protocol.
Katriel Cohn-Gordon
Cas Cremers
Benjamin Dowling
Luke Garratt
Douglas Stebila
2017
conf/pkc
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures.
Mihir Bellare
Bertram Poettering
Douglas Stebila
2016
conf/ccs
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE.
Joppe W. Bos
Craig Costello
Léo Ducas
Ilya Mironov
Michael Naehrig
Valeria Nikolaenko
Ananth Raghunathan
Douglas Stebila
2016
conf/uss
Authenticated Network Time Synchronization.
Benjamin Dowling
Douglas Stebila
Greg Zaverucha
2016
conf/esorics
Secure Logging Schemes and Certificate Transparency.
Benjamin Dowling
Felix Günther
Udyani Herath
Douglas Stebila
2016
conf/ctrsa
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
Colin Boyd
Britta Hale
Stig Frode Mjølsnes
Douglas Stebila
2016
conf/eurocrypt
Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters.
Christina Brzuska
Håkon Jacobsen
Douglas Stebila
2016
conf/asiacrypt
From Identification to Signatures, Tightly: A Framework and Generic Transforms.
Mihir Bellare
Bertram Poettering
Douglas Stebila
2016
conf/sacrypt
Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project.
Douglas Stebila
Michele Mosca
2015
conf/ccs
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
Benjamin Dowling
Marc Fischlin
Felix Günther
Douglas Stebila
2015
conf/acisp
Modelling Ciphersuite and Version Negotiation in the TLS Protocol.
Benjamin Dowling
Douglas Stebila
2015
conf/fc
Protecting Encrypted Cookies from Compression Side-Channel Attacks.
Janaka Alawatugoda
Douglas Stebila
Colin Boyd
2015
conf/fc
Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage.
Gus Gutoski
Douglas Stebila
2015
conf/sp
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.
Joppe W. Bos
Craig Costello
Michael Naehrig
Douglas Stebila
2014
conf/ccs
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol.
Florian Bergsma
Benjamin Dowling
Florian Kohlar
Jörg Schwenk
Douglas Stebila
2014
conf/ccs
Modelling after-the-fact leakage for key exchange.
Janaka Alawatugoda
Douglas Stebila
Colin Boyd
2014
conf/acisp
Continuous After-the-Fact Leakage-Resilient Key Exchange.
Janaka Alawatugoda
Colin Boyd
Douglas Stebila
2014
conf/esorics
Double-Authentication-Preventing Signatures.
Bertram Poettering
Douglas Stebila
2013
conf/ccs
On the security of TLS renegotiation.
Florian Giesen
Florian Kohlar
Douglas Stebila
2013
conf/acisp
Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two.
Leah F. South
Douglas Stebila
2013
conf/crypto
Quantum One-Time Programs - (Extended Abstract).
Anne Broadbent
Gus Gutoski
Douglas Stebila
2013
conf/fc
Usability and Security of Gaze-Based Graphical Grid Passwords.
Majid Arianezhad
Douglas Stebila
Behzad Mozaffari
2013
conf/esorics
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems.
Colin Boyd
Cas Cremers
Michèle Feltz
Kenneth G. Paterson
Bertram Poettering
Douglas Stebila
2012
conf/ccs
Practical client puzzles in the standard model.
Lakshmi Kuppusamy
Jothi Rangasamy
Douglas Stebila
Colin Boyd
Juan Manuel González Nieto
2012
conf/acisp
Effort-Release Public-Key Encryption from Cryptographic Puzzles.
Jothi Rangasamy
Douglas Stebila
Colin Boyd
Juan Manuel González Nieto
Lakshmi Kuppusamy
2011
conf/ccs
An integrated approach to cryptographic mitigation of denial-of-service attacks.
Jothi Rangasamy
Douglas Stebila
Colin Boyd
Juanma González Nieto
2011
conf/icisc
Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection.
Jothi Rangasamy
Douglas Stebila
Lakshmi Kuppusamy
Colin Boyd
Juan Manuel González Nieto
2011
conf/ctrsa
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols.
Douglas Stebila
Lakshmi Kuppusamy
Jothi Rangasamy
Colin Boyd
Juan Manuel González Nieto
2010
conf/latincrypt
Fixed Argument Pairings.
Craig Costello
Douglas Stebila
2010
conf/acisp
Predicate-Based Key Exchange.
James Birkett
Douglas Stebila
2010
conf/acisp
One-Time-Password-Authenticated Key Exchange.
Kenneth G. Paterson
Douglas Stebila
2009
conf/acisp
Towards Denial-of-Service-Resilient Key Agreement Protocols.
Douglas Stebila
Berkant Ustaoglu
2006
conf/ches
Unified Point Addition Formulæ and Side-Channel Attacks.
Douglas Stebila
Nicolas Thériault
2004
conf/ndss
Speeding up Secure Web Transactions Using Elliptic Curve Cryptography.
Vipul Gupta
Douglas Stebila
Stephen Fung
Sheueling Chang Shantz
Nils Gura
Hans Eberle
2003
conf/acisp
Generic GF(2) Arithmetic in Software and Its Application to ECC.
André Weimerskirch
Douglas Stebila
Sheueling Chang Shantz
2002
conf/ches
An End-to-End Systems Approach to Elliptic Curve Cryptography.
Nils Gura
Sheueling Chang Shantz
Hans Eberle
Sumit Gupta
Vipul Gupta
Daniel F. Finchelstein
Edouard Goupy
Douglas Stebila
Coauthors
Adrien Guinet
(1)
Ananth Raghunathan
(1)
André Weimerskirch
(1)
Anne Broadbent
(1)
Behzad Mozaffari
(1)
Benjamin Dowling
(8)
Berkant Ustaoglu
(1)
Bertram Poettering
(5)
Britta Hale
(1)
Carlos Aguilar Melchor
(1)
Cas Cremers
(3)
Chris Peikert
(1)
Christian Janson
(2)
Christina Brzuska
(1)
Colin Boyd
(10)
Craig Costello
(3)
Daniel F. Finchelstein
(1)
David Joseph
(1)
Douglas Stebila
(57)
Edouard Goupy
(1)
Edward Eaton
(2)
Felix Günther
(8)
Fernando Virdia
(1)
Florian Bergsma
(1)
Florian Giesen
(1)
Florian Kohlar
(2)
Georg Land
(1)
Greg Zaverucha
(2)
Gus Gutoski
(2)
Håkon Jacobsen
(1)
Hans Eberle
(2)
Ilya Mironov
(1)
Jacqueline Brendel
(2)
James Birkett
(1)
Janaka Alawatugoda
(3)
Jason Goertzen
(1)
Jonathan Hoyland
(1)
Joppe W. Bos
(2)
Jörg Schwenk
(2)
Jothi Rangasamy
(5)
Juan Manuel González Nieto
(4)
Juanma González Nieto
(1)
Kathrin Hövelmanns
(1)
Katriel Cohn-Gordon
(2)
Kenneth G. Paterson
(2)
Lakshmi Kuppusamy
(4)
Leah F. South
(1)
Léo Ducas
(1)
Lewis Glabush
(2)
Luke Garratt
(2)
Majid Arianezhad
(1)
Marc Fischlin
(3)
Marcel Tiepelt
(1)
Matthias J. Kannwischer
(1)
Michael Naehrig
(3)
Michael Rosenberg
(1)
Michèle Feltz
(1)
Michele Mosca
(1)
Mihir Bellare
(2)
Mike Ounsworth
(1)
Moe Sabry
(1)
Nicolas Thériault
(1)
Nils Gura
(2)
Nina Bindel
(1)
Patrick Longa
(1)
Paul Rösler
(1)
Peter Schwabe
(3)
Philip W. Hodges
(2)
Reza Samavi
(1)
Roy Stracovsky
(1)
Rune Fiedler
(1)
Shannon Veitch
(3)
Sheueling Chang Shantz
(3)
Sofía Celi
(1)
Spencer Wilson
(1)
Stephen Fung
(1)
Stig Frode Mjølsnes
(1)
Sumit Gupta
(1)
Thom Wiggers
(4)
Thomas Bailleux
(1)
Tim Güneysu
(1)
Udyani Herath
(1)
Valeria Nikolaenko
(1)
Vipul Gupta
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to