Robust channels: Handling unreliable networks in the record layers of QUIC and DTLS 1.3

M Fischlin, F Günther, C Janson - Journal of Cryptology, 2024 - Springer
The common approach in secure communication channel protocols is to rely on ciphertexts
arriving in-order and to close the connection upon any rogue ciphertext. Cryptographic …

Populating the Zoo of Rugged Pseudorandom Permutations

JP Degabriele, V Karadžić - International Conference on the Theory and …, 2023 - Springer
Abstract A Rugged Pseudorandom Permutation (RPRP) is a variable-input-length tweakable
cipher satisfying a security notion that is intermediate between tweakable PRP and …

Small Stretch Problem of the DCT Scheme and How to Fix It

Y Chen, T Guo, L Hu, L Shang, S Mao… - Cryptology ePrint …, 2023 - eprint.iacr.org
DCT is a beyond-birthday-bound~(BBB) deterministic authenticated encryption~(DAE) mode
proposed by Forler et al. in ACISP 2016, ensuring integrity by redundancy. The instantiation …

CCA Security with Short AEAD Tags

M Khairallah - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The size of the authentication tag represents a significant overhead for applications that are
limited by bandwidth or memory. Hence, some authenticated encryption designs have a …

Designing Secure-by-Default Cryptography for Computer Systems

J Len - 2024 - search.proquest.com
Designing cryptography that protects against all the threats seen in deployment can be
surprisingly hard to do. This frequently translates into mitigations which offload important …

[引用][C] On the Tight Security of the Transport Layer Security (TLS) Protocol Version 1.3

D Diemert - 2023 - Dissertation, Wuppertal, Bergische …