Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities

J Ahn, R Hussain, K Kang, J Son - … Communications Surveys & …, 2025 - ieeexplore.ieee.org
Cryptographic network protocols play a crucial role in enabling secure data exchange over
insecure media in modern network environments. However, even minor vulnerabilities can …

A systematic evaluation of automated tools for side-channel vulnerabilities detection in cryptographic libraries

A Geimer, M Vergnolle, F Recoules, LA Daniel… - Proceedings of the …, 2023 - dl.acm.org
To protect cryptographic implementations from side-channel vulnerabilities, developers must
adopt constant-time programming practices. As these can be error-prone, many side …

Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey

S Szymoniak - ACM Computing Surveys, 2024 - dl.acm.org
We use sensor technologies in many areas of everyday life. We use sensors to check and
study various phenomena and to improve our lives. Hence, the sensors are used in …

[PDF][PDF] “These results must be false”: A usability evaluation of constant-time analysis tools

M Fourné, DDA Braga, J Jancar, M Sabt… - 33th USENIX Security …, 2024 - usenix.org
Cryptography secures our online interactions, transactions, and trust. To achieve this goal,
not only do the cryptographic primitives and protocols need to be secure in theory, they also …

RefleXnoop: Passwords Snooping on NLoS Laptops Leveraging Screen-Induced Sound Reflection

P Wang, J Hu, C Liu, J Luo - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Password inference attacks by covert wireless side-channels jeopardize information safety,
even for people with high security awareness and vigilance against snoopers. Yet, with …

Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks

X Zhou, Q Deng, J Pu, K Man, Z Qian… - Proceedings of the …, 2024 - dl.acm.org
Home wireless mesh networks (WMNs) are increasingly gaining popularity for their superior
extensibility and signal coverage compared to traditional single-AP wireless networks. In …

Provable security analysis of the secure remote password protocol

D Dayanikli, A Lehmann - 2024 IEEE 37th Computer Security …, 2024 - ieeexplore.ieee.org
This paper analyses the Secure Remote Password Protocol (SRP) in the context of provable
security. SRP is an asymmetric Password-Authenticated Key Exchange (aPAKE) protocol …

From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake

DDA Braga, N Kulatova, M Sabt… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
It is universally acknowledged that Wi-Fi communications are important to secure. Thus, the
Wi-Fi Alliance published WPA3 in 2018 with a distinctive security feature: it leverages a …

Password-authenticated Key Exchange and Applications

K Gjøsteen - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We analyse a two password-authenticated key exchange protocols, a variant of CPace and
a protocol related to the well-known SRP protocol. Our security results are tight. The first …

Micro-architectural side channels: Studying the attack surface from hardware to browsers

C Maurice - 2023 - inria.hal.science
Hardware is often represented as an abstract layer that behaves correctly, executes
instructions and produces a result. However, side effects due to the execution of …