Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …

Verifying {Constant-Time} Implementations

JB Almeida, M Barbosa, G Barthe… - 25th USENIX Security …, 2016 - usenix.org
The constant-time programming discipline is an effective countermeasure against timing
attacks, which can lead to complete breaks of otherwise secure systems. However, adhering …

A systematic survey on security in anonymity networks: Vulnerabilities, attacks, defenses, and formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem

JW Bos, C Costello, M Naehrig… - 2015 IEEE symposium …, 2015 - ieeexplore.ieee.org
Lattice-based cryptographic primitives are believed to offer resilience against attacks by
quantum computers. We demonstrate the practicality of post-quantum key exchange by …

Lucky thirteen: Breaking the TLS and DTLS record protocols

NJ Al Fardan, KG Paterson - 2013 IEEE symposium on security …, 2013 - ieeexplore.ieee.org
The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of
data in transit across untrusted networks. TLS has become the de facto secure protocol of …

A messy state of the union: Taming the composite state machines of TLS

B Beurdouche, K Bhargavan… - Communications of the …, 2017 - dl.acm.org
The Transport Layer Security (TLS) protocol supports various authentication modes, key
exchange methods, and protocol extensions. Confusingly, each combination may prescribe …

[CARTE][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

The applied pi calculus: Mobile values, new names, and secure communication

M Abadi, B Blanchet, C Fournet - Journal of the ACM (JACM), 2017 - dl.acm.org
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …

Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS

K Bhargavan, AD Lavaud, C Fournet… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
TLS was designed as a transparent channel abstraction to allow developers with no
cryptographic expertise to protect their application against attackers that may control some …

On the security of the TLS protocol: A systematic analysis

H Krawczyk, KG Paterson, H Wee - Annual Cryptology Conference, 2013 - Springer
TLS is the most widely-used cryptographic protocol on the Internet. It comprises the TLS
Handshake Protocol, responsible for authentication and key establishment, and the TLS …