Hybrid keys in practice: combining classical, quantum and post-quantum cryptography

S Ricci, P Dobias, L Malina, J Hajny, P Jedlicka - IEEE Access, 2024 - ieeexplore.ieee.org
Currently, with the threat of quantum computer attacks, the idea of combining several same-
type primitives has reemerged. This is also the case for cryptographic keys where a hybrid …

When messages are keys: Is HMAC a dual-PRF?

M Backendal, M Bellare, F Günther… - Annual International …, 2023 - Springer
In Internet security protocols including TLS 1.3, KEMTLS, MLS and Noise, HMAC is being
assumed to be a dual-PRF, meaning a PRF not only when keyed conventionally (through its …

A Survey on the Quantum Security of Block Cipher-Based Cryptography

SE Bootsma, M De Vries - IEEE Access, 2024 - ieeexplore.ieee.org
The development of quantum computers represents an important advancement in
computing, using quantum mechanics to address problems that were previously difficult to …

Post-quantum multi-recipient public key encryption

J Alwen, D Hartmann, E Kiltz, M Mularczyk… - Proceedings of the …, 2023 - dl.acm.org
A multi-message multi-recipient PKE (mmPKE) encrypts a batch of messages, in one go, to a
corresponding set of independently chosen receiver public keys. The resulting''multi …

[หนังสือ][B] Post-quantum tls

TV Wiggers - 2024 - repository.ubn.ru.nl
The internet is secured using a cryptographic system called TLS; also known from the 'lock
on the browser'. However, the building blocks of that system are in need of replacement …

Algorithm substitution attacks against receivers

M Armour, B Poettering - International Journal of Information Security, 2022 - Springer
This work describes a class of Algorithm Substitution Attack (ASA) generically targeting the
receiver of a communication between two parties. Our work provides a unified framework …

Implementation of Lattice Theory into the TLS to Ensure Secure Traffic Transmission in IP Networks Based on IP PBX Asterisk.

O Abramkina, M Yakubova, T Serikov… - International …, 2024 - search.ebscohost.com
This paper presents a novel lattice-based cryptography implementation in the Transport
Layer Security (TLS) protocol to enhance the security of traffic transmission in IP networks …

[PDF][PDF] Modelling cryptographic attacks by powerful adversaries

M Armour - 2023 - pure.royalholloway.ac.uk
In this work we consider the ability of powerful adversaries to conduct attacks targeting
cryptography. The archetype for a powerful adversary is a nation state actor that has access …

Post-quantum cryptography in OpenPGP

A Wussler - 2023 - repositum.tuwien.at
Given the recent advancements in quantum computing and Shor's algorithm, this project
aims at bringing Post-Quantum cryptography for e-mail and file encryption as well as …

[PDF][PDF] HAPKIDO Project Report D5. 2

S Fehr, YH Huang, A Amadori - 2023 - hapkido.tno.nl
1.1 Background The security of current public-key encryption and digital signature schemes
relies on the (believed) hardness of factoring large integers and of computing discrete …