SoK: Computer-aided cryptography
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …
formal, machine-checkable approaches to the design, analysis, and implementation of …
A comprehensive symbolic analysis of TLS 1.3
The TLS protocol is intended to enable secure end-to-end communication over insecure
networks, including the Internet. Unfortunately, this goal has been thwarted a number of …
networks, including the Internet. Unfortunately, this goal has been thwarted a number of …
Verified models and reference implementations for the TLS 1.3 standard candidate
K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …
design is a reaction both to the increasing demand for low-latency HTTPS connections and …
{DROWN}: breaking {TLS} using {SSLv2}
DROWN: Breaking TLS using SSLv2 Page 1 This paper is included in the Proceedings of the
25th USENIX Security Symposium August 10–12, 2016 • Austin, TX ISBN 978-1-931971-32-4 …
25th USENIX Security Symposium August 10–12, 2016 • Austin, TX ISBN 978-1-931971-32-4 …
A survey of mobile VPN technologies
A Alshalan, S Pisharody… - … Communications Surveys & …, 2015 - ieeexplore.ieee.org
Virtual private network (VPN) is the traditional approach for an end-to-end secure
connection between two endpoints. Most existing VPN solutions are intended for wired …
connection between two endpoints. Most existing VPN solutions are intended for wired …
A messy state of the union: Taming the composite state machines of TLS
B Beurdouche, K Bhargavan… - Communications of the …, 2017 - dl.acm.org
The Transport Layer Security (TLS) protocol supports various authentication modes, key
exchange methods, and protocol extensions. Confusingly, each combination may prescribe …
exchange methods, and protocol extensions. Confusingly, each combination may prescribe …
[KNJIGA][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach
N Kobeissi, K Bhargavan… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
Many popular web applications incorporate end-toend secure messaging protocols, which
seek to ensure that messages sent between users are kept confidential and authenticated …
seek to ensure that messages sent between users are kept confidential and authenticated …
The applied pi calculus: Mobile values, new names, and secure communication
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …
scoped names, with communication via messages on channels. This interaction is crucial in …
Verified low-level programming embedded in F
We present Low*, a language for low-level programming and verification, and its application
to high-assurance optimized cryptographic libraries. Low* is a shallow embedding of a …
to high-assurance optimized cryptographic libraries. Low* is a shallow embedding of a …