Follow
Benjamin Dowling
Benjamin Dowling
Verified email at kcl.ac.uk - Homepage
Title
Cited by
Cited by
Year
A formal security analysis of the signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
Journal of Cryptology 33, 1914-1983, 2020
4892020
A cryptographic analysis of the TLS 1.3 handshake protocol candidates
B Dowling, M Fischlin, F Günther, D Stebila
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1722015
A cryptographic analysis of the TLS 1.3 handshake protocol
B Dowling, M Fischlin, F Günther, D Stebila
Journal of Cryptology 34 (4), 37, 2021
912021
Secure logging schemes and certificate transparency
B Dowling, F Günther, U Herath, D Stebila
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
742016
A cryptographic analysis of the WireGuard protocol
B Dowling, KG Paterson
Applied Cryptography and Network Security: 16th International Conference …, 2018
592018
A cryptographic analysis of the TLS 1.3 draft-10 full and pre-shared key handshake protocol
B Dowling, M Fischlin, F Günther, D Stebila
Cryptology ePrint Archive, 2016
552016
Authenticated network time synchronization
B Dowling, D Stebila, G Zaverucha
25th USENIX security symposium (USENIX security 16), 823-840, 2016
492016
Multi-ciphersuite security of the Secure Shell (SSH) protocol
F Bergsma, B Dowling, F Kohlar, J Schwenk, D Stebila
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
492014
Identity confidentiality in 5G mobile telephony systems
H Khan, B Dowling, KM Martin
International Conference on Research in Security Standardisation, 120-142, 2018
362018
Practically-exploitable cryptographic vulnerabilities in matrix
MR Albrecht, S Celi, B Dowling, D Jones
2023 IEEE Symposium on Security and Privacy (SP), 164-181, 2023
282023
Many a mickle makes a muckle: A framework for provably quantum-secure hybrid key exchange
B Dowling, TB Hansen, KG Paterson
International Conference on Post-Quantum Cryptography, 483-502, 2020
272020
Modelling ciphersuite and version negotiation in the TLS protocol
B Dowling, D Stebila
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
252015
Flexible authenticated and confidential channel establishment (fACCE): Analyzing the noise protocol framework
B Dowling, P Rösler, J Schwenk
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
212020
Secure messaging authentication against active man-in-the-middle attacks
B Dowling, B Hale
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 54-70, 2021
192021
Highly efficient privacy-preserving key agreement for wireless body area networks
H Khan, B Dowling, KM Martin
2018 17th IEEE international conference on trust, security and privacy in …, 2018
182018
Post quantum noise
Y Angel, B Dowling, A Hülsing, P Schwabe, F Weber
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
162022
There can be no compromise: The necessity of ratcheted authentication in secure messaging
B Dowling, B Hale
Cryptology ePrint Archive, 2020
132020
Privacy-aware secure region-based handover for small cell networks in 5G-enabled mobile communication
R Alnashwan, P Gope, B Dowling
IEEE Transactions on Information Forensics and Security 18, 1898-1913, 2023
102023
Continuous authentication in secure messaging
B Dowling, F Günther, A Poirrier
European Symposium on Research in Computer Security, 361-381, 2022
102022
Strongly anonymous ratcheted key exchange
B Dowling, E Hauck, D Riepel, P Rösler
International Conference on the Theory and Application of Cryptology and …, 2022
82022
The system can't perform the operation now. Try again later.
Articles 1–20