{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T06:12:28Z","timestamp":1770358348009,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/M013472\/1"],"award-info":[{"award-number":["EP\/M013472\/1"]}]},{"name":"EPSRC","award":["EP\/K035584\/1"],"award-info":[{"award-number":["EP\/K035584\/1"]}]},{"name":"Huawei Technologies"},{"name":"UK government","award":["EP\/K035584\/1"],"award-info":[{"award-number":["EP\/K035584\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978364","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1480-1491","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["A Surfeit of SSH Cipher Suites"],"prefix":"10.1145","author":[{"given":"Martin R.","family":"Albrecht","sequence":"first","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Jean Paul","family":"Degabriele","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Torben Brandt","family":"Hansen","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Kenneth G.","family":"Paterson","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.5"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.42"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586112"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996945"},{"key":"e_1_3_2_1_5_1","volume-title":"Jan.","author":"Bellare M.","year":"2006","unstructured":"Bellare , M. , Kohno , T. , and Namprempre , C . The Secure Shell (SSH) Transport Layer Encryption Modes. RFC 4344 (Proposed Standard) , Jan. 2006 . Bellare, M., Kohno, T., and Namprempre, C. The Secure Shell (SSH) Transport Layer Encryption Modes. RFC 4344 (Proposed Standard), Jan. 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/647096.716997"},{"key":"e_1_3_2_1_7_1","unstructured":"Bernstein D. Chacha a variant of salsa20. http:\/\/cr.yp.to\/chacha\/chacha-20080128.pdf 2008.  Bernstein D. Chacha a variant of salsa20. http:\/\/cr.yp.to\/chacha\/chacha-20080128.pdf 2008."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_3"},{"key":"e_1_3_2_1_9_1","volume-title":"July","author":"Bider D.","year":"2012","unstructured":"Bider , D. , and Baushke , M . SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol. RFC 6668 (Proposed Standard) , July 2012 . Bider, D., and Baushke, M. SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol. RFC 6668 (Proposed Standard), July 2012."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_40"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43933-3_19"},{"key":"e_1_3_2_1_12_1","unstructured":"Dai W. SSH2 attack. http:\/\/www.weidai.com\/ssh2-attack.txt 2002.  Dai W. SSH2 attack. http:\/\/www.weidai.com\/ssh2-attack.txt 2002."},{"key":"e_1_3_2_1_13_1","volume-title":"Usenix Security","volume":"2013","author":"Durumeric Z.","year":"2013","unstructured":"Durumeric , Z. , Wustrow , E. , and Halderman , J. A . Zmap: Fast internet-wide scanning and its security applications . In Usenix Security ( 2013 ), vol. 2013 . Durumeric, Z., Wustrow, E., and Halderman, J. A. Zmap: Fast internet-wide scanning and its security applications. In Usenix Security (2013), vol. 2013."},{"key":"e_1_3_2_1_14_1","volume-title":"Aug.","author":"Igoe K.","year":"2009","unstructured":"Igoe , K. , and Solinas , J . AES Galois Counter Mode for the Secure Shell Transport Layer Protocol. RFC 5647 (Informational) , Aug. 2009 . Igoe, K., and Solinas, J. AES Galois Counter Mode for the Secure Shell Transport Layer Protocol. RFC 5647 (Informational), Aug. 2009."},{"key":"e_1_3_2_1_15_1","volume-title":"Insecure","author":"Lyon G. F.","year":"2009","unstructured":"Lyon , G. F. Nmap network scanning: The official Nmap project guide to network discovery and security scanning . Insecure , 2009 . Lyon, G. F. Nmap network scanning: The official Nmap project guide to network discovery and security scanning. Insecure, 2009."},{"key":"e_1_3_2_1_16_1","volume-title":"The galois\/counter mode of operation (gcm). Submission to NIST Modes of Operation Process","author":"McGrew D.","year":"2004","unstructured":"McGrew , D. , and Viega , J . The galois\/counter mode of operation (gcm). Submission to NIST Modes of Operation Process , 2004 . McGrew, D., and Viega, J. The galois\/counter mode of operation (gcm). Submission to NIST Modes of Operation Process, 2004."},{"key":"e_1_3_2_1_17_1","volume-title":"Working Draft","author":"Miller D.","year":"2015","unstructured":"Miller , D. , and Josefsson , S . The chacha20-poly1305@openssh.com authenticated encryption cipher . Working Draft , Nov 2015 . Miller, D., and Josefsson, S. The chacha20-poly1305@openssh.com authenticated encryption cipher. Working Draft, Nov 2015."},{"key":"e_1_3_2_1_18_1","volume-title":"September","author":"Miller D.","year":"2007","unstructured":"Miller , D. , and Valchev , P . The use of umac in the ssh transport layer protocol. https:\/\/tools.ietf.org\/html\/draft-miller-secsh-umac-01 , September 2007 . Miller, D., and Valchev, P. The use of umac in the ssh transport layer protocol. https:\/\/tools.ietf.org\/html\/draft-miller-secsh-umac-01, September 2007."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_15"},{"key":"e_1_3_2_1_20_1","volume-title":"May","author":"Nir Y.","year":"2015","unstructured":"Nir , Y. , and Langley , A . ChaCha20 and Poly1305 for IETF Protocols. RFC 7539 (Informational) , May 2015 . Nir, Y., and Langley, A. ChaCha20 and Poly1305 for IETF Protocols. RFC 7539 (Informational), May 2015."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_18"},{"key":"e_1_3_2_1_22_1","unstructured":"Rogaway P. Problems with proposed ip cryptography. http:\/\/www.cs.ucdavis.edu\/ rogaway\/papers\/draft-rogaway-ipsec-comments-00.txt April 1995.  Rogaway P. Problems with proposed ip cryptography. http:\/\/www.cs.ucdavis.edu\/ rogaway\/papers\/draft-rogaway-ipsec-comments-00.txt April 1995."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_22"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_23"},{"key":"e_1_3_2_1_25_1","volume-title":"Jan.","author":"Ylonen T.","year":"2006","unstructured":"Ylonen , T. , and Lonvick , C . The Secure Shell (SSH) Transport Layer Protocol. RFC 4253 (Proposed Standard) , Jan. 2006 . Updated by RFC 6668. Ylonen, T., and Lonvick, C. The Secure Shell (SSH) Transport Layer Protocol. RFC 4253 (Proposed Standard), Jan. 2006. Updated by RFC 6668."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978364","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:14Z","timestamp":1750218014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978364"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":25,"alternative-id":["10.1145\/2976749.2978364","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978364","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}