Determining the core primitive for optimally secure ratcheting
After ratcheting attracted attention mostly due to practical real-world protocols, recently a line
of work studied ratcheting as a primitive from a theoretic point of view. Literature in this line …
of work studied ratcheting as a primitive from a theoretic point of view. Literature in this line …
Clone detection in secure messaging: improving post-compromise security in practice
We investigate whether modern messaging apps achieve the strong post-compromise
security guarantees offered by their underlying protocols. In particular, we perform a black …
security guarantees offered by their underlying protocols. In particular, we perform a black …
On secure ratcheting with immediate decryption
J Pijnenburg, B Poettering - International Conference on the Theory and …, 2022 - Springer
Ratcheting protocols let parties securely exchange messages in environments in which state
exposure attacks are anticipated. While, unavoidably, some promises on confidentiality and …
exposure attacks are anticipated. While, unavoidably, some promises on confidentiality and …
Symmetric asynchronous ratcheted communication with associated data
Following up mass surveillance and privacy issues, modern secure communication
protocols now seek strong security, such as forward secrecy and post-compromise security …
protocols now seek strong security, such as forward secrecy and post-compromise security …
[PDF][PDF] Optimally secure instant messaging with immediate decryption and backup solutions
J Pijnenburg - 2023 - core.ac.uk
This thesis explores security goals in the instant messaging setting and backup solutions for
messages and media, both in the case where the device is still available (but has limited …
messages and media, both in the case where the device is still available (but has limited …
[PDF][PDF] Cryptographic foundations of modern stateful and continuous key exchange primitives
PC Rösler - 2021 - roeslpa.de
Protecting communication cryptographically is usually considered and realized modularly:
Protocols for protecting the actual payload utilize session keys that are exchanged by other …
Protocols for protecting the actual payload utilize session keys that are exchanged by other …
[CITAS][C] Time in cryptography
G Choi - 2020 - EPFL