List of papers by publication type

See also my list of papers by topic.

Books

  1. Protocols for Authentication and Key Establishment, Second Edition. C. Boyd, A. Mathuria, D. Stebila. Information Security and Cryptography. Springer, 2019.

Conference proceedings edited

  1. Proc. 20th Australasian Conference on Information Security and Privacy (ACISP) 2015. E. Foo, D. Stebila, editors. LNCS, vol. 9144. Springer, 2015.
  2. Proc. 26th Annual Conference on Selected Areas in Cryptography (SAC) 2019. K. G. Paterson, D. Stebila, editors. LNCS, vol. 11959. Springer, 2019.
  3. Advances in Cryptology – CRYPTO 2024, Part I. L. Reyzin, D. Stebila, editors. LNCS, vol. 14920. Springer, 2024.
  4. Advances in Cryptology – CRYPTO 2024, Part II. L. Reyzin, D. Stebila, editors. LNCS, vol. 14921. Springer, 2024.
  5. Advances in Cryptology – CRYPTO 2024, Part III. L. Reyzin, D. Stebila, editors. LNCS, vol. 14922. Springer, 2024.
  6. Advances in Cryptology – CRYPTO 2024, Part IV. L. Reyzin, D. Stebila, editors. LNCS, vol. 14923. Springer, 2024.
  7. Advances in Cryptology – CRYPTO 2024, Part V. L. Reyzin, D. Stebila, editors. LNCS, vol. 14924. Springer, 2024.
  8. Advances in Cryptology – CRYPTO 2024, Part VI. L. Reyzin, D. Stebila, editors. LNCS, vol. 14925. Springer, 2024.
  9. Advances in Cryptology – CRYPTO 2024, Part VII. L. Reyzin, D. Stebila, editors. LNCS, vol. 14926. Springer, 2024.
  10. Advances in Cryptology – CRYPTO 2024, Part VIII. L. Reyzin, D. Stebila, editors. LNCS, vol. 14927. Springer, 2024.
  11. Advances in Cryptology – CRYPTO 2024, Part IX. L. Reyzin, D. Stebila, editors. LNCS, vol. 14928. Springer, 2024.
  12. Advances in Cryptology – CRYPTO 2024, Part X. L. Reyzin, D. Stebila, editors. LNCS, vol. 14929. Springer, 2024.

Refereed journal papers

  1. Anonymity and one-way authentication in key exchange protocols. I. Goldberg, D. Stebila, B. Ustaoglu. In Designs, Codes and Cryptography, 2013.
  2. Publicly verifiable ciphertexts (full version). J. González Nieto, M. Manulis, B. Poettering, J. Rangasamy, D. Stebila. In Journal of Computer Security, 2013.
  3. Plaintext awareness in identity-based key encapsulation. M. Manulis, B. Poettering, D. Stebila. In International Journal of Information Security, 2014.
  4. Secure modular password authentication for the web using channel bindings (full version). M. Manulis, D. Stebila, F. Kiefer, N. Denham. In International Journal of Information Security, 2016.
  5. Double-authentication-preventing signatures (full version). B. Poettering, D. Stebila. In International Journal of Information Security, 2017.
  6. ASICS: Authenticated key exchange security incorporating certification systems (full version). C. Boyd, C. Cremers, M. Feltz, K. G. Paterson, B. Poettering, D. Stebila. In International Journal of Information Security, 2017.
  7. Efficient oblivious database joins. S. Krastnikov, F. Kerschbaum, D. Stebila. In Proceedings of the VLDB Endowment, 2020.
  8. A formal security analysis of the Signal messaging protocol. K. Cohn-Gordon, C. Cremers, B. Dowling, L. Garratt, D. Stebila. In Journal of Cryptology, 2020.
  9. Associative blockchain for decentralized PKI transparency. X. Boyen, U. Herath, M. McKague, D. Stebila. In Cryptography, 2021.
  10. Algorithm substitution attacks: state reset detection and asymmetric modifications. P. Hodges, D. Stebila. In IACR Transactions on Symmetric Cryptography, 2021.
  11. A cryptographic analysis of the TLS 1.3 handshake protocol. B. Dowling, M. Fischlin, F. Günther, D. Stebila. In Journal of Cryptology, 2021.
  12. A reduction-based proof for authentication and session key security in 3-party Kerberos. J. Schwenk, D. Stebila. In International Journal of Applied Cryptography, 2023.

Refereed conference papers

  1. An end-to-end systems approach to elliptic curve cryptography. N. Gura, S. Chang Shantz, H. Eberle, S. Gupta, V. Gupta, D. Finchelstein, E. Goupy, D. Stebila. In CHES 2002.
  2. Performance analysis of elliptic curve cryptography for SSL. V. Gupta, S. Gupta, S. Chang, D. Stebila. In ACM Wireless Security 2002.
  3. Generic GF(2m) arithmetic in software and its application to ECC. A. Weimerskirch, D. Stebila, S. Chang. In ACISP 2003.
  4. Speeding up secure web transactions using elliptic curve cryptography. V. Gupta, D. Stebila, S. Fung, S. Chang, N. Gura, H. Eberle. In NDSS 2004.
  5. Integrating elliptic curve cryptography into the web's security infrastructure. V. Gupta, D. Stebila, S. Chang. In ACM WWW 2004.
  6. Unified point addition formulæ and side-channel attacks. D. Stebila, N. Thériault. In CHES 2006.
  7. Towards denial-of-service-resilient key agreement protocols. D. Stebila, B. Ustaoglu. In ACISP 2009.
  8. The case for quantum key distribution. D. Stebila, M. Mosca, N. Lütkenhaus. In QuantumComm 2009.
  9. Quantum coins. M. Mosca, D. Stebila. In Error-Correcting Codes, Finite Geometries and Cryptography 2010.
  10. Multi-factor password-authenticated key exchange. D. Stebila, P. Udupi, S. Chang. In AISC 2010.
  11. Predicate-based key exchange. J. Birkett, D. Stebila. In ACISP 2010.
  12. One-time-password-authenticated key exchange. K. G. Paterson, D. Stebila. In ACISP 2010.
  13. Fixed argument pairings. C. Costello, D. Stebila. In LATINCRYPT 2010.
  14. Reinforcing bad behaviour: the misuse of security indicators on popular websites. D. Stebila. In OzCHI 2010.
  15. Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. D. Stebila, L. Kuppusamy, J. Rangasamy, C. Boyd, J. González Nieto. In CT-RSA 2011.
  16. An integrated approach to cryptographic mitigation of denial-of-service attacks. J. Rangasamy, D. Stebila, C. Boyd, J. González Nieto. In ACM ASIACCS 2011.
  17. Defending web services against denial of service attacks using client puzzles. S. Suriadi, D. Stebila, A. Clark, H. Liu. In IEEE ICWS 2011.
  18. Efficient modular exponentiation-based puzzles for denial-of-service protection. J. Rangasamy, D. Stebila, C. Boyd, J. González Nieto, L. Kuppusamy. In ICISC 2011.
  19. Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy. L. Kuppusamy, J. Rangasamy, D. Stebila, C. Boyd, J. González Nieto. In INDOCRYPT 2011.
  20. Practical client puzzles in the standard model. L. Kuppusamy, J. Rangasamy, D. Stebila, C. Boyd, J. González Nieto. In ACM ASIACCS 2012.
  21. Effort-release public-key encryption from cryptographic puzzles. J. Rangasamy, D. Stebila, C. Boyd, J. González Nieto, L. Kuppusamy. In ACISP 2012.
  22. Self-identified experts lost on the Interwebs. T. Kelley, S. Lien, L. J. Camp, D. Stebila. In LASER 2012.
  23. Publicly verifiable ciphertexts. J. González Nieto, M. Manulis, B. Poettering, J. Rangasamy, D. Stebila. In SCN 2012.
  24. Comparative eye tracking of experts and novices in web single sign-on. M. Arianezhad, L. J. Camp, T. Kelley, D. Stebila. In ACM CODASPY 2013.
  25. Usability and security of gaze-based graphical grid passwords. M. Arianezhad, D. Stebila, B. Mozaffari. In USEC 2013.
  26. Quantum key distribution in the classical authenticated key exchange framework. M. Mosca, D. Stebila, B. Ustaoglu. In PQCrypto 2013.
  27. Count-min sketches for estimating password frequency within Hamming distance two. L. South, D. Stebila. In ACISP 2013.
  28. Quantum one-time programs. A. Broadbent, G. Gutoski, D. Stebila. In CRYPTO 2013.
  29. ASICS: Authenticated key exchange security incorporating certification systems. C. Boyd, C. Cremers, M. Feltz, K. G. Paterson, B. Poettering, D. Stebila. In ESORICS 2013.
  30. On the security of TLS renegotiation. F. Giesen, F. Kohlar, D. Stebila. In ACM CCS 2013.
  31. Formalising human recognition: A fundamental building block for security proofs. K. Radke, C. Boyd, J. González Nieto, M. Manulis, D. Stebila. In AISC 2014.
  32. Modelling after-the-fact leakage for key exchange. J. Alawatugoda, D. Stebila, C. Boyd. In ACM ASIACCS 2014.
  33. Continuous after-the-fact leakage-resilient key exchange. J. Alawatugoda, C. Boyd, D. Stebila. In ACISP 2014.
  34. Double-authentication-preventing signatures. B. Poettering, D. Stebila. In ESORICS 2014.
  35. Multi-ciphersuite security of the Secure Shell (SSH) protocol. F. Bergsma, B. Dowling, F. Kohlar, J. Schwenk, D. Stebila. In ACM CCS 2014.
  36. Secure modular password authentication for the web using channel bindings. M. Manulis, D. Stebila, N. Denham. In SSR 2014.
  37. Protecting encrypted cookies from compression side-channel attacks. J. Alawatugoda, D. Stebila, C. Boyd. In FC 2015.
  38. Hierarchical deterministic Bitcoin wallets that tolerate key leakage. G. Gutoski, D. Stebila. In FC 2015.
  39. Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. J. W. Bos, C. Costello, M. Naehrig, D. Stebila. In IEEE S&P 2015.
  40. Modelling ciphersuite and version negotiation in the TLS protocol. B. Dowling, D. Stebila. In ACISP 2015.
  41. An analysis of TLS handshake proxying. D. Stebila, N. Sullivan. In IEEE TrustCom 2015.
  42. A cryptographic analysis of the TLS 1.3 handshake protocol candidates. B. Dowling, M. Fischlin, F. Günther, D. Stebila. In ACM CCS 2015.
  43. Continuous after-the-fact leakage-resilient eCK-secure key exchange. J. Alawatugoda, D. Stebila, C. Boyd. In IMA Cryptography & Coding 2015.
  44. Predicting TLS performance from key exchange performance. F. Moghimifar, D. Stebila. In AISC 2016.
  45. From stateless to stateful: Generic authentication and authenticated encryption constructions with application to TLS. B. Hale, C. Boyd, S. F. Mjølsnes, D. Stebila. In CT-RSA 2016.
  46. Safely exporting keys from secure channels: On the security of EAP-TLS and TLS Key Exporters. C. Brzuska, H. Jacobsen, D. Stebila. In EUROCRYPT 2016.
  47. Authenticated network time synchronization. B. Dowling, D. Stebila, G. Zaverucha. In USENIX Security 2016.
  48. Secure logging schemes and Certificate Transparency. B. Dowling, F. Günther, U. Herath, D. Stebila. In ESORICS 2016.
  49. Frodo: Take off the ring! Practical, quantum-secure key exchange from LWE. J. Bos, C. Costello, L. Ducas, I. Mironov, M. Naehrig, V. Nikolaenko, A. Raghunathan, D. Stebila. In ACM CCS 2016.
  50. Post-quantum key exchange for the Internet and the Open Quantum Safe project. D. Stebila, M. Mosca. In SAC 2016.
  51. From identification to signatures, tightly: A framework and generic transforms. M. Bellare, B. Poettering, D. Stebila. In ASIACRYPT 2016.
  52. Deterring certificate subversion: efficient double-authentication-preventing signatures. M. Bellare, B. Poettering, D. Stebila. In PKC 2017.
  53. A formal security analysis of the Signal messaging protocol. K. Cohn-Gordon, C. Cremers, B. Dowling, L. Garratt, D. Stebila. In IEEE EuroS&P 2017.
  54. Transitioning to a quantum-resistant public key infrastructure. N. Bindel, U. Herath, M. McKague, D. Stebila. In PQCrypto 2017.
  55. Security analysis of a design variant of randomized hashing. P. Gauravaram, S. Hirose, D. Stebila. In ATIS 2017.
  56. Hybrid key encapsulation mechanisms and authenticated key exchange. N. Bindel, J. Brendel, M. Fischlin, B. Goncalves, D. Stebila. In PQCrypto 2019.
  57. Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. E. Crockett, C. Paquin, D. Stebila. In NIST PQC Standardization 2019.
  58. Benchmarking post-quantum cryptography in TLS. C. Paquin, D. Stebila, G. Tamvada. In PQCrypto 2020.
  59. ArchiveSafe: mass-leakage-resistant storage from proof-of-work. M. Sabry, R. Samavi, D. Stebila. In DPM 2020.
  60. Towards post-quantum security for Signal's X3DH handshake. J. Brendel, M. Fischlin, F. Günther, C. Janson, D. Stebila. In SAC 2020.
  61. Post-quantum TLS without handshake signatures. P. Schwabe, D. Stebila, T. Wiggers. In ACM CCS 2020.
  62. SoK: Game-based security models for group key exchange. B. Poettering, P. Rösler, J. Schwenk, D. Stebila. In CT-RSA 2021.
  63. The “quantum annoying” property of password-authenticated key exchange protocols. E. Eaton, D. Stebila. In PQCrypto 2021.
  64. More efficient post-quantum KEMTLS with pre-distributed public keys. P. Schwabe, D. Stebila, T. Wiggers. In ESORICS 2021.
  65. Improved attacks against key reuse in learning with errors key exchange. N. Bindel, D. Stebila, S. Veitch. In LATINCRYPT 2021.
  66. Post-quantum key-blinding for authentication in anonymity networks. E. Eaton, D. Stebila, R. Stracovsky. In LATINCRYPT 2021.
  67. Post-quantum asynchronous deniable key exchange and the Signal handshake. J. Brendel, R. Fiedler, F. Günther, C. Janson, D. Stebila. In PKC 2022.
  68. Improving software quality in cryptography standardization projects. M. J. Kannwischer, P. Schwabe, D. Stebila, T. Wiggers. In SSR 2022.
  69. A tale of two models: formal verification of KEMTLS via Tamarin. S. Celi, J. Hoyland, D. Stebila, T. Wiggers. In ESORICS 2022.
  70. Proof-of-possession for KEM certificates using verifiable generation. T. Güneysu, P. Hodges, G. Land, M. Ounsworth, D. Stebila, G. Zaverucha. In ACM CCS 2022.
  71. Post-quantum signatures in DNSSEC via request-based fragmentation. J. Goertzen, D. Stebila. In PQCrypto 2023.
  72. Making an asymmetric PAKE quantum-annoying by hiding group elements. M. Tiepelt, E. Eaton, D. Stebila. In ESORICS 2023.
  73. Quantum-safe account recovery for WebAuthn. D. Stebila, S. Wilson. In ACM ASIACCS 2024.
  74. TurboTLS: TLS connection establishment with 1 less round trip. C. Aguilar-Melchor, T. Bailleux, J. Goertzen, A. Guinet, D. Joseph, D. Stebila. In ESORICS 2024.
  75. Obfuscated key exchange. F. Günther, D. Stebila, S. Veitch. In ACM CCS 2024.

Technical standards

  1. ECMQV_ECQV cipher suites for Transport Layer Security (TLS). M. Campagna, D. Stebila. Internet-Draft, 2009.
  2. Elliptic-curve algorithm integration in the Secure Shell transport layer. D. Stebila, J. Green. RFC 5656, 2009.
  3. X.509v3 certificates for Secure Shell authentication. K. Igoe, D. Stebila. RFC 6187, 2011.
  4. A Transport Layer Security (TLS) extension for establishing an additional shared secret. J.M. Schanck, D. Stebila. Internet-Draft, 2017.
  5. NewHope. E. Alkim, R. Avanzi, J. W. Bos, L. Ducas, A. de la Piedra, P. Schwabe, D. Stebila, M. R. Albrecht, E. Orsini, V. Osheter, K. G. Paterson, G. Peer, N. P. Smart. Submission to the NIST Post-Quantum Cryptography standardization project, Round 2, 2019.
  6. FrodoKEM: Learning with errors key encapsulation. E. Alkim, J. W. Bos, L. Ducas, K. Easterbrook, B. LaMacchia, P. Longa, I. Mironov, M. Naehrig, V. Nikolaenko, C. Peikert, A. Raghunathan, D. Stebila. Submission to the NIST Post-Quantum Cryptography standardization project, Round 3, 2020.
  7. X25519Kyber768Draft00 hybrid post-quantum key agreement. B. Westerbaan, D. Stebila. Internet-Draft, 2023.
  8. KEM-based authentication for TLS 1.3. S. Celi, P. Schwabe, D. Stebila, N. Sullivan, T. Wiggers. Internet-Draft, 2023.
  9. KEM-based pre-shared-key handshakes for TLS 1.3. T. Wiggers, S. Celi, P. Schwabe, D. Stebila, N. Sullivan. Internet-Draft, 2023.
  10. TurboTLS for faster connection establishment. D. Stebila, D. Joseph, C. Aguilar-Melchor, J. Goertzen. Internet-Draft, 2023.
  11. Hybrid key exchange in TLS 1.3. D. Stebila, S. Fluhrer, S. Gueron. Internet-Draft, 2024.
  12. Post-quantum hybrid key exchange in SSH. P. Kampanakis, D. Stebila, T. Hansen. Internet-Draft, 2024.
  13. Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3. K. Kwiatkowski, P. Kampanakis, B. Westerbaan, D. Stebila. Internet-Draft, 2024.

Technical reports and unrefereed articles

  1. Quantum safe cryptography and security: An introduction, benefits, enablers and challengers. M. Campagna et al., D. Stebila. ETSI (European Telecommunications Standards Institute), 2015.
  2. A cryptographic analysis of the TLS 1.3 draft-10 full and pre-shared key handshake protocol. B. Dowling, M. Fischlin, F. Günther, D. Stebila. 2016.
  3. Challenges in cryptography. A. Menezes, D. Stebila. In IEEE Security & Privacy, 2021.
  4. End-to-end security: when do we have it?. A. Menezes, D. Stebila. In IEEE Security & Privacy, 2021.
  5. CHES 2021 artifact review. D. Stebila. In IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022.
  6. The Advanced Encryption Standard: 20 years later. A. Menezes, D. Stebila. In IEEE Security & Privacy, 2021.
  7. A formal treatment of distributed key generation, and new constructions. C. Komlo, I. Goldberg, D. Stebila. 2023.
  8. Security analysis of the iMessage PQ3 protocol. D. Stebila. 2024.
  9. Falsifiability, composability, and comparability of game-based security models for key exchange protocols. C. Brzuska, C. Cremers, H. Jacobsen, D. Stebila, B. Warinschi. 2024.

Book chapters

  1. Cryptographic approaches to denial-of-service resistance. C. Boyd, J. González Nieto, L. Kuppusamy, H. Narasimham, C. Pandu Rangan, J. Rangasamy, J. Smith, D. Stebila, V. Varadarajan. In An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection, Springer, 2011.
  2. Denial of service defence appliance for web services. S. Suriadi, A. Clark, H. Liu, D. Schmidt, J. Smith, D. Stebila. In An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection, Springer, 2011.

Refereed conference posters

  1. Oblivious transfer from any non-trivial binary-symmetric channel. D. Stebila, S. Wolf. In IEEE ISIT 2002.
  2. Uncloneable quantum money. M. Mosca, D. Stebila. In QIP 2007.

Dissertations

  1. Cryptographic applications of graph theoretic constructions. D. Stebila. MSc thesis, University of Oxford, 2004.
  2. Classical authenticated key exchange and quantum cryptography. D. Stebila. PhD thesis, University of Waterloo, 2009.