WhatsUpp with sender keys? Analysis, improvements and security proofs

D Balbás, D Collins, P Gajland - … Conference on the Theory and Application …, 2023 - Springer
Developing end-to-end encrypted instant messaging solutions for group conversations is an
ongoing challenge that has garnered significant attention from practitioners and the …

Comparse: Provably secure formats for cryptographic protocols

T Wallez, J Protzenko, K Bhargavan - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Data formats used for cryptographic inputs have historically been the source of many attacks
on cryptographic protocols, but their security guarantees remain poorly studied. One reason …

Interoperability in end-to-end encrypted messaging

J Len, E Ghosh, P Grubbs, P Rösler - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract The Digital Markets Act (DMA) is a nascent European Union regulation adopted in
May 2022. One of its most controversial provisions is a requirement that so-called …

Keyboard Fighters: The Use of ICTs by Activists in Times of Military Coup in Myanmar

LG Guntrum - Proceedings of the CHI Conference on Human Factors …, 2024 - dl.acm.org
Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable
research gap on ICT-supported activism. Generally, ICTs play an important role during …

On The Challenges of Bringing Cryptography from Papers to Products: Results from an Interview Study with Experts

K Fischer, I Trummová, P Gajland, Y Acar… - In 33rd USENIX …, 2024 - teamusec.de
Cryptography serves as the cornerstone of information security and privacy in modern
society. While notable progress has been made in the implementation of cryptographic …

Accurate and Efficient Code Matching Across Android Application Versions Against Obfuscation

R Feng, Z Zhang, Y Zhou, Z Yan… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
In an effort to enhance the attractiveness of apps, developers consistently and frequently
release updates to introduce new features and address known issues. Although frequent …

Cryptographic Analysis of Delta Chat

Y Song, L Mareková, KG Paterson - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We analyse the cryptographic protocols underlying Delta Chat, a decentralised messaging
application which uses e-mail infrastructure for message delivery. It provides end-to-end …

One Protocol to Rule Them All? On Securing Interoperable Messaging

J Blessing, R Anderson - Cambridge International Workshop on Security …, 2023 - Springer
European lawmakers have ruled that users on different platforms should be able to
exchange messages with each other. Yet messaging interoperability opens up a Pandora's …

MFKDF: Multiple Factors Knocked Down Flat

M Scarlata, M Backendal, M Haller - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Nair and Song (USENIX 2023) introduce the concept of a Multi-Factor Key Derivation
Function (MFKDF), along with constructions and a security analysis. MFKDF integrates …

Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend

T Isobe, R Ito, K Minematsu - Journal of Information Processing, 2023 - jstage.jst.go.jp
This paper summarizes our cryptanalysis results on real-world End-to-End Encryption
(E2EE) schemes published in recent years. Our targets are LINE (a major messaging …