Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Lucky thirteen: Breaking the TLS and DTLS record protocols

NJ Al Fardan, KG Paterson - 2013 IEEE symposium on security …, 2013 - ieeexplore.ieee.org
The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of
data in transit across untrusted networks. TLS has become the de facto secure protocol of …

Implementing TLS with verified cryptographic security

K Bhargavan, C Fournet, M Kohlweiss… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
TLS is possibly the most used protocol for secure communications, with a 18-year history of
flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the …

Bypassing tunnels: leaking {VPN} client traffic by abusing routing tables

N Xue, Y Malla, Z Xia, C Pöpper… - 32nd USENIX Security …, 2023 - usenix.org
Virtual Private Networks (VPNs) authenticate and encrypt network traffic to protect users'
security and privacy, and are used in professional and personal settings to defend against …

Secure cloud storage meets with secure network coding

F Chen, T Xiang, Y Yang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper reveals an intrinsic relationship between secure cloud storage and secure
network coding for the first time. Secure cloud storage was proposed only recently while …

Efficient padding oracle attacks on cryptographic hardware

R Bardou, R Focardi, Y Kawamoto, L Simionato… - Annual Cryptology …, 2012 - Springer
We show how to exploit the encrypted key import functions of a variety of different
cryptographic devices to reveal the imported key. The attacks are padding oracle attacks …

Efail: Breaking {S/MIME} and {OpenPGP} email encryption using exfiltration channels

D Poddebniak, C Dresen, J Müller, F Ising… - 27th USENIX Security …, 2018 - usenix.org
OpenPGP and S/MIME are the two prime standards for providing end-to-end security for
emails. We describe novel attacks built upon a technique we call malleability gadgets to …

The Dangers of Key Reuse: Practical Attacks on {IPsec}{IKE}

D Felsch, M Grothe, J Schwenk, A Czubak… - 27th USENIX Security …, 2018 - usenix.org
IPsec enables cryptographic protection of IP packets. It is commonly used to build VPNs
(Virtual Private Networks). For key establishment, the IKE (Internet Key Exchange) protocol …

[PDF][PDF] Plaintext-recovery attacks against datagram TLS

N AlFardan, KG Paterson - Network and distributed …, 2012 - pdfs.semanticscholar.org
Plaintext-Recovery Attacks Against Datagram TLS Page 1 Plaintext-Recovery Attacks Against
Datagram TLS Nadhem Alfardan and Kenneth Paterson Information Security Group Royal …

Data is a stream: Security of stream-based channels

M Fischlin, F Günther, GA Marson… - Advances in Cryptology …, 2015 - Springer
The common approach to defining secure channels in the literature is to consider
transportation of discrete messages provided via atomic encryption and decryption …