A formal security analysis of the signal messaging protocol

K Cohn-Gordon, C Cremers, B Dowling, L Garratt… - Journal of …, 2020 - Springer
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …

[PDF][PDF] The x3dh key agreement protocol

M Marlinspike, T Perrin - Open Whisper Systems, 2016 - signal.org
This document describes the “X3DH”(or “Extended Triple Diffie-Hellman”) key agreement
protocol. X3DH establishes a shared secret key between two parties who mutually …

Security of electronic payment systems: A comprehensive survey

S Solat - arXiv preprint arXiv:1701.04556, 2017 - arxiv.org
This comprehensive survey deliberated over the security of electronic payment systems. In
our research, we focused on either dominant systems or new attempts and innovations to …

On the security of TLS 1.3 and QUIC against weaknesses in PKCS# 1 v1. 5 encryption

T Jager, J Schwenk, J Somorovsky - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
Encrypted key transport with RSA-PKCS# 1 v1. 5 is the most commonly deployed key
exchange method in all current versions of the Transport Layer Security (TLS) protocol …

Proving the TLS handshake secure (as it is)

K Bhargavan, C Fournet, M Kohlweiss, A Pironti… - Advances in Cryptology …, 2014 - Springer
Abstract The TLS Internet Standard features a mixed bag of cryptographic algorithms and
constructions, letting clients and servers negotiate their use for each run of the handshake …

SoK: How (not) to design and implement post-quantum cryptography

J Howe, T Prest, D Apon - Cryptographers' Track at the RSA Conference, 2021 - Springer
Post-quantum cryptography has known a Cambrian explosion in the last decade. What
started as a very theoretical and mathematical area has now evolved into a sprawling …

An overview of the emv protocol and its security vulnerabilities

N El Madhoun, E Bertin… - 2018 Fourth International …, 2018 - ieeexplore.ieee.org
EMV (Europay Mastercard Visa) is the international standard implemented to secure
purchase and deposit/withdrawal transactions. It represents a set of security rules and …

Bleichenbacher's attack strikes again: Breaking PKCS# 1 v1. 5 in XML encryption

T Jager, S Schinzel, J Somorovsky - … Security, Pisa, Italy, September 10-12 …, 2012 - Springer
We describe several attacks against the PKCS# 1 v1. 5 key transport mechanism of XML
Encryption. Our attacks allow to recover the secret key used to encrypt transmitted payload …

On the effectiveness of time travel to inject COVID-19 alerts

V Iovino, S Vaudenay, M Vuagnoux - Cryptographers' Track at the RSA …, 2021 - Springer
Digital contact tracing apps allow to alert people who have been in contact with people who
may be contagious. The Google/Apple Exposure Notification (GAEN) system is based on …

[PDF][PDF] Cryptographic protocols from physical assumptions

A Koch - 2019 - core.ac.uk
Modern cryptography does not only enable to protect your personal data on the Internet, or
to authenticate for certain services, but also evaluate a function on private inputs of multiple …