Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application

PM Kumar, UD Gandhi - The Journal of Supercomputing, 2020 - Springer
As health data are very sensitive, there is a need to prevent and control the health data with
end-to-end security solutions. In general, a number of authentication and authorization …

Practical and tightly-secure digital signatures and authenticated key exchange

K Gjøsteen, T Jager - Advances in Cryptology–CRYPTO 2018: 38th …, 2018 - Springer
Tight security is increasingly gaining importance in real-world cryptography, as it allows to
choose cryptographic parameters in a way that is supported by a security proof, without the …

Signed (group) diffie–hellman key exchange with tight security

J Pan, C Qian, M Ringerud - Journal of Cryptology, 2022 - Springer
We propose the first tight security proof for the ordinary two-message signed Diffie–Hellman
key exchange protocol in the random oracle model. Our proof is based on the strong …

Post quantum noise

Y Angel, B Dowling, A Hülsing, P Schwabe… - Proceedings of the 2022 …, 2022 - dl.acm.org
We introduce PQNoise, a post-quantum variant of the Noise framework. We demonstrate
that it is possible to replace the Diffie-Hellman key-exchanges in Noise with KEMs in a …

Dynamic Group Time-Based One-Time Passwords

X Cao, Z Yang, J Ning, C **, R Lu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Group time-based one-time passwords (GTOTP) is a novel lightweight cryptographic
primitive for achieving anonymous client authentication, which enables the efficient …

Flexible authenticated and confidential channel establishment (fACCE): Analyzing the noise protocol framework

B Dowling, P Rösler, J Schwenk - IACR International Conference on …, 2020 - Springer
The Noise protocol framework is a suite of channel establishment protocols, of which each
individual protocol ensures various security properties of the transmitted messages, but …

Key-schedule security for the TLS 1.3 standard

C Brzuska, A Delignat-Lavaud, C Egger… - … Conference on the …, 2022 - Springer
Abstract Transport Layer Security (TLS) is the cryptographic backbone of secure
communication on the Internet. In its latest version 1.3, the standardization process has …

HTTPS contribution in web application security: A systematic literature review

F Wijitrisnanto, P Yustianto - 2020 International Conference …, 2020 - ieeexplore.ieee.org
A Web application is one of the most used technology nowadays due to its flexibility in
delivering services to society. It also plays a good portion in enhancing our daily life since it …

T0RTT: non-interactive immediate forward-secret single-pass circuit construction

S Lauer, K Gellert, R Merget, T Handirk… - Cryptology ePrint …, 2019 - eprint.iacr.org
Maintaining privacy on the Internet with the presence of powerful adversaries such as nation-
state attackers is a challenging topic, and the Tor project is currently the most important tool …

Key Exchange

C BOYD - Asymmetric Cryptography: Primitives and Protocols, 2022 - Wiley Online Library
This chapter explains the elements of key exchange, specifically the steps in a key
exchange protocol, the parties that are involved and the messages which may be sent. It …