Follow
Benjamin Dowling
Benjamin Dowling
Verified email at sheffield.ac.uk - Homepage
Title
Cited by
Cited by
Year
A formal security analysis of the signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
Journal of Cryptology 33, 1914-1983, 2020
4362020
A cryptographic analysis of the TLS 1.3 handshake protocol candidates
B Dowling, M Fischlin, F Günther, D Stebila
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1632015
Secure logging schemes and certificate transparency
B Dowling, F Günther, U Herath, D Stebila
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
702016
A cryptographic analysis of the TLS 1.3 handshake protocol
B Dowling, M Fischlin, F Günther, D Stebila
Journal of Cryptology 34 (4), 37, 2021
682021
A cryptographic analysis of the TLS 1.3 draft-10 full and pre-shared key handshake protocol
B Dowling, M Fischlin, F Günther, D Stebila
Cryptology ePrint Archive, 2016
552016
A cryptographic analysis of the WireGuard protocol
B Dowling, KG Paterson
Applied Cryptography and Network Security: 16th International Conference …, 2018
522018
Authenticated network time synchronization
B Dowling, D Stebila, G Zaverucha
25th USENIX security symposium (USENIX security 16), 823-840, 2016
462016
Multi-ciphersuite security of the Secure Shell (SSH) protocol
F Bergsma, B Dowling, F Kohlar, J Schwenk, D Stebila
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
432014
Identity confidentiality in 5G mobile telephony systems
H Khan, B Dowling, KM Martin
International Conference on Research in Security Standardisation, 120-142, 2018
322018
Modelling ciphersuite and version negotiation in the TLS protocol
B Dowling, D Stebila
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
232015
Many a mickle makes a muckle: a framework for provably quantum-secure hybrid key exchange
B Dowling, TB Hansen, KG Paterson
International Conference on Post-Quantum Cryptography, 483-502, 2020
222020
Practically-exploitable cryptographic vulnerabilities in matrix
MR Albrecht, S Celi, B Dowling, D Jones
2023 IEEE Symposium on Security and Privacy (SP), 164-181, 2023
202023
Flexible authenticated and confidential channel establishment (fACCE): Analyzing the noise protocol framework
B Dowling, P Rösler, J Schwenk
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
182020
Highly efficient privacy-preserving key agreement for wireless body area networks
H Khan, B Dowling, KM Martin
2018 17th IEEE international conference on trust, security and privacy in …, 2018
172018
Secure messaging authentication against active man-in-the-middle attacks
B Dowling, B Hale
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 54-70, 2021
142021
Strongly anonymous ratcheted key exchange
B Dowling, E Hauck, D Riepel, P Rösler
International Conference on the Theory and Application of Cryptology and …, 2022
92022
There can be no compromise: The necessity of ratcheted authentication in secure messaging
B Dowling, B Hale
Cryptology ePrint Archive, 2020
92020
Post quantum noise
Y Angel, B Dowling, A Hülsing, P Schwabe, F Weber
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
82022
Provable security of internet protocols
BJ Dowling
Queensland University of Technology, 2017
72017
Continuous authentication in secure messaging
B Dowling, F Günther, A Poirrier
European Symposium on Research in Computer Security, 361-381, 2022
62022
The system can't perform the operation now. Try again later.
Articles 1–20