A formal security analysis of the signal messaging protocol

K Cohn-Gordon, C Cremers, B Dowling, L Garratt… - Journal of …, 2020 - Springer
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …

Post-quantum TLS without handshake signatures

P Schwabe, D Stebila, T Wiggers - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
We present KEMTLS, an alternative to the TLS 1.3 handshake that uses key-encapsulation
mechanisms (KEMs) instead of signatures for server authentication. Among existing post …

A comprehensive symbolic analysis of TLS 1.3

C Cremers, M Horvat, J Hoyland, S Scott… - Proceedings of the …, 2017 - dl.acm.org
The TLS protocol is intended to enable secure end-to-end communication over insecure
networks, including the Internet. Unfortunately, this goal has been thwarted a number of …

Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …

[CARTE][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

A cryptographic analysis of the TLS 1.3 handshake protocol

B Dowling, M Fischlin, F Günther, D Stebila - Journal of Cryptology, 2021 - Springer
We analyze the handshake protocol of the Transport Layer Security (TLS) protocol, version
1.3. We address both the full TLS 1.3 handshake (the one round-trip time mode, with …

The provable security of ed25519: theory and practice

J Brendel, C Cremers, D Jackson… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
A standard requirement for a signature scheme is that it is existentially unforgeable under
chosen message attacks (EUF-CMA), alongside other properties of interest such as strong …

A symbolic analysis of privacy for tls 1.3 with encrypted client hello

K Bhargavan, V Cheval, C Wood - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
TLS 1.3, the newest version of the Transport Layer Security (TLS) protocol, provides strong
authentication and confidentiality guarantees that have been comprehensively analyzed in a …

On the tight security of TLS 1.3: Theoretically sound cryptographic parameters for real-world deployments

D Diemert, T Jager - Journal of Cryptology, 2021 - Springer
We consider the theoretically sound selection of cryptographic parameters, such as the size
of algebraic groups or RSA keys, for TLS 1.3 in practice. While prior works gave security …

A comprehensive study of {DNS-over-HTTPS} downgrade attack

Q Huang, D Chang, Z Li - 10th USENIX Workshop on Free and Open …, 2020 - usenix.org
DNS-over-HTTPS (DoH) is one major effort to protect DNS confidentiality and integrity,
which has been deployed by most of the popular browsers. However, we found this effort …