8th BIU Winter School

8th BIU Winter School

What Are Key Exchange Protocols?

Speaker: Hugo Krawczyk
8th BIU Winter School

Overview of Security Definitions

Speaker: Hugo Krawczyk
8th BIU Winter School

Diffie- Hellman Protocols and Authenticators

Speaker: Hugo Krawczyk
8th BIU Winter School

STS, SIGMA and IKA (IPsec’s Key Exchange)

Speaker: Hugo Krawczyk
8th BIU Winter School

Implicitly Authenticated KEPs

Speaker: Hugo Krawczyk
8th BIU Winter School

More on Implicit Authentication; Key Derivation

Speaker: Hugo Krawczyk
8th BIU Winter School

Bellare-Rogaway-Security of Key Exchange (passive adversaries)

Speaker: Fischlin M
8th BIU Winter School

Bellare-Rogaway-Security of Key Exchange (active adversaries)

Speaker: Fischlin M
8th BIU Winter School

Forward Secrecy

Speaker: Fischlin M
8th BIU Winter School

TLS 1.3 and other protocols

Speaker: Fischlin M
8th BIU Winter School

Zero Round-Trip Time (0-RTT)

Speaker: Fischlin M
8th BIU Winter School

Universally Composable Key Exchange

Speaker: Fischlin M
8th BIU Winter School

Man-in-the-Middle Attacks on Authenticated Key Exchange

Speaker: Bhargavan K
8th BIU Winter School

Downgrade Attacks on Agile Real-World Protocols

Speaker: Bhargavan K
8th BIU Winter School

Automated Symbolic Protocol Verification

Speaker: Bhargavan K
8th BIU Winter School

Mechanized Computational Protocol Proofs

Speaker: Bhargavan K
8th BIU Winter School

Verified Cryptographic Libraries

Speaker: Bhargavan K
8th BIU Winter School

Verified Cryptographic Protocol Implementations

Speaker: Bhargavan K