A comprehensive, formal and automated analysis of the {EDHOC} protocol

C Jacomme, E Klein, S Kremer… - 32nd USENIX Security …, 2023 - usenix.org
EDHOC is a key exchange proposed by IETF's Lightweight Authenticated Key Exchange
(LAKE) Working Group (WG). Its design focuses on small message sizes to be suitable for …

Sok: Secure e-voting with everlasting privacy

T Haines, J Mueller, R Mosaheb… - Privacy Enhancing …, 2023 - orbilu.uni.lu
Vote privacy is a fundamental right, which needs to be protected not only during an election,
or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e …

Decision and complexity of Dolev-Yao hyperproperties

I Rakotonirina, G Barthe, C Schneidewind - Proceedings of the ACM on …, 2024 - dl.acm.org
The formal analysis of cryptographic protocols traditionally focuses on trace and
equivalence properties, for which decision procedures in the symbolic (or Dolev-Yao, or DY) …

SoK: Post-Quantum TLS Handshake

N Alnahawi, J Müller, J Oupický… - Cryptology ePrint …, 2023 - eprint.iacr.org
Abstract Transport Layer Security (TLS) is the backbone security protocol of the Internet. As
this fundamental protocol is at risk from future quantum attackers, many proposals have …

[HTML][HTML] Terrapin Attack: Breaking {SSH} Channel Integrity By Sequence Number Manipulation

F Bäumer, W Liu, M Brinkmann, L Peng… - 33rd USENIX Security …, 2024 - usenix.org
USENIX Security '24 Technical Sessions | USENIX Sign In Conferences Attend Registration
Information Registration Discounts Grant Opportunities Venue, Hotel, and Travel Program …

Careful with MAc-then-SIGn: A computational analysis of the EDHOC lightweight authenticated key exchange protocol

F Günther, MIT Mukendi - 2023 IEEE 8th European Symposium …, 2023 - ieeexplore.ieee.org
EDHOC is a lightweight authenticated key exchange protocol for IoT communication,
currently being standardized by the IETF. Its design is a trimmed-down version of similar …

Kyber, Saber, and SK‐MLWR Lattice‐Based Key Encapsulation Mechanisms Model Checking with Maude

DD Tran, K Ogata, S Escobar, S Akleylek… - IET Information …, 2023 - Wiley Online Library
Facing the potential threat raised by quantum computing, a great deal of research from many
groups and industrial giants has gone into building public‐key post‐quantum cryptographic …

Decision and complexity of Dolev-Yao hyperproperties (technical report)

I Rakotonirina, G Barthe, C Schneidewind - Symposium on Principles of …, 2024 - hal.science
The formal analysis of cryptographic protocols traditionally focuses on trace and
equivalence properties, for which decision procedures in the symbolic (or Dolev-Yao, or DY) …

Formal Verification and Solutions for Estonian E-Voting

S Baloglu, S Bursuc, S Mauw, J Pang - Proceedings of the 19th ACM …, 2024 - dl.acm.org
Estonia has been deploying electronic voting for its government elections since 2005. The
underlying e-voting system and protocol have been continuously improved, aiming to fix the …

A Unified Symbolic Analysis of WireGuard

P Lafourcade, D Mahmoud, S Ruhault - Usenix Network and …, 2024 - uca.hal.science
WireGuard [22],[21] is a Virtual Private Network (VPN), presented at NDSS 2017, recently
integrated into the Linux Kernel [57] and paid commercial VPNs such as NordVPN, Mullvad …