Robust channels: Handling unreliable networks in the record layers of QUIC and DTLS 1.3
The common approach in secure communication channel protocols is to rely on ciphertexts
arriving in-order and to close the connection upon any rogue ciphertext. Cryptographic …
arriving in-order and to close the connection upon any rogue ciphertext. Cryptographic …
Populating the Zoo of Rugged Pseudorandom Permutations
Abstract A Rugged Pseudorandom Permutation (RPRP) is a variable-input-length tweakable
cipher satisfying a security notion that is intermediate between tweakable PRP and …
cipher satisfying a security notion that is intermediate between tweakable PRP and …
Small Stretch Problem of the DCT Scheme and How to Fix It
Y Chen, T Guo, L Hu, L Shang, S Mao… - Cryptology ePrint …, 2023 - eprint.iacr.org
DCT is a beyond-birthday-bound~(BBB) deterministic authenticated encryption~(DAE) mode
proposed by Forler et al. in ACISP 2016, ensuring integrity by redundancy. The instantiation …
proposed by Forler et al. in ACISP 2016, ensuring integrity by redundancy. The instantiation …
CCA Security with Short AEAD Tags
M Khairallah - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The size of the authentication tag represents a significant overhead for applications that are
limited by bandwidth or memory. Hence, some authenticated encryption designs have a …
limited by bandwidth or memory. Hence, some authenticated encryption designs have a …
Designing Secure-by-Default Cryptography for Computer Systems
J Len - 2024 - search.proquest.com
Designing cryptography that protects against all the threats seen in deployment can be
surprisingly hard to do. This frequently translates into mitigations which offload important …
surprisingly hard to do. This frequently translates into mitigations which offload important …
[CITATION][C] On the Tight Security of the Transport Layer Security (TLS) Protocol Version 1.3
D Diemert - 2023 - Dissertation, Wuppertal, Bergische …