-
1
-
-
84924705705
-
Tightly-secure authenticated key exchange
-
LNCS. Springer, Heidelberg, Mar
-
Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, and Yong Li. "Tightly-Secure Authenticated Key Exchange". In: TCC 2015, Part I. Vol. 9014. LNCS. Springer, Heidelberg, Mar. 2015, pp. 629-658.
-
(2015)
TCC 2015, Part I
, vol.9014
, pp. 629-658
-
-
Bader, C.1
Hofheinz, D.2
Jager, T.3
Kiltz, E.4
Li, Y.5
-
2
-
-
85026648229
-
-
(visited on 01/2017)
-
Chris Ballinger. ChatSecure. URL: https://chatsecure.org/ blog/chatsecure-v4-released/ (visited on 01/2017).
-
ChatSecure
-
-
Ballinger, C.1
-
3
-
-
85028475491
-
Ratcheted encryption and key exchange: The security of messaging
-
Mihir Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, and Igors Stepanovs. Ratcheted Encryption and Key Exchange: The Security of Messaging. Cryptology ePrint Archive, Report 2016/1028. http://eprint.iacr.org/2016/1028. 2016.
-
(2016)
Cryptology EPrint Archive, Report 2016/1028
-
-
Bellare, M.1
Camper Singh, A.2
Jaeger, J.3
Nyayapati, M.4
Stepanovs, I.5
-
4
-
-
35248891000
-
Forward-security in private-key cryptography
-
LNCS. Springer, Heidelberg, Apr
-
Mihir Bellare and Bennet S. Yee. "Forward-Security in Private-Key Cryptography". In: CT-RSA 2003. Vol. 2612. LNCS. Springer, Heidelberg, Apr. 2003, pp. 1-18.
-
(2003)
CT-RSA 2003
, vol.2612
, pp. 1-18
-
-
Bellare, M.1
Yee, B.S.2
-
5
-
-
80053515348
-
High-speed high-security signatures
-
LNCS. Springer, Heidelberg, Sept
-
Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. "High-Speed High-Security Signatures". In: CHES 2011. Vol. 6917. LNCS. Springer, Heidelberg, Sept. 2011, pp. 124-142.
-
(2011)
CHES 2011
, vol.6917
, pp. 124-142
-
-
Bernstein, D.J.1
Duif, N.2
Lange, T.3
Schwabe, P.4
Yang, B.5
-
6
-
-
84987664765
-
Downgrade resilience in key-exchange protocols
-
IEEE Computer Society Press, May
-
Karthikeyan Bhargavan, Christina Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, and Santiago Zanella-Béguelin. "Downgrade Resilience in Key-Exchange Protocols". In: 2016 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 2016.
-
(2016)
2016 IEEE Symposium on Security and Privacy
-
-
Bhargavan, K.1
Brzuska, C.2
Fournet, C.3
Green, M.4
Kohlweiss, M.5
Zanella-Béguelin, S.6
-
7
-
-
85026651702
-
-
Mar. 2, (visited on 07/2016)
-
David Bogado and Danny O'Brien. Punished for a Paradox. Mar. 2, 2016. URL: https://www.eff.org/deeplinks/2016/03/ punished-for-paradox-brazils-facebook (visited on 07/2016).
-
(2016)
Punished for a Paradox
-
-
Bogado, D.1
O'Brien, D.2
-
8
-
-
20444490057
-
Off-therecord Communication, or, Why Not to Use PGP
-
Washington DC, USA: ACM
-
Nikita Borisov, Ian Goldberg, and Eric Brewer. "Off-therecord Communication, or, Why Not to Use PGP". In: WPES. Washington DC, USA: ACM, 2004, pp. 77-84.
-
(2004)
WPES
, pp. 77-84
-
-
Borisov, N.1
Goldberg, I.2
Brewer, E.3
-
9
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
LNCS. Springer, Heidelberg, May
-
Ran Canetti, Shai Halevi, and Jonathan Katz. "A Forward-Secure Public-Key Encryption Scheme". In: EUROCRYPT 2003. Vol. 2656. LNCS. Springer, Heidelberg, May 2003, pp. 255-271.
-
(2003)
EUROCRYPT 2003
, vol.2656
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
10
-
-
85024505355
-
-
Cryptology ePrint Archive, Report 2016/1013
-
Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas Stebila. A Formal Security Analysis of the Signal Messaging Protocol. Cryptology ePrint Archive, Report 2016/1013. http://eprint.iacr.org/2016/1013. 2016.
-
(2016)
A Formal Security Analysis of the Signal Messaging Protocol
-
-
Cohn-Gordon, K.1
Cremers, C.2
Dowling, B.3
Garratt, L.4
Stebila, D.5
-
12
-
-
33847081093
-
-
(visited on 07/2016)
-
Conversations. URL: https://conversations.im/ (visited on 07/2016).
-
Conversations
-
-
-
14
-
-
84987660705
-
Automated analysis and verification of tls 1.3: 0-rtt, resumption and delayed authentication
-
IEEE Computer Society Press, May
-
Cas Cremers, Marko Horvat, Sam Scott, and Thyla van der Merwe. "Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication". In: 2016 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 2016.
-
(2016)
2016 IEEE Symposium on Security and Privacy
-
-
Cremers, C.1
Horvat, M.2
Scott, S.3
Van Der Merwe, T.4
-
15
-
-
84857775893
-
On the joint security of encryption and signature in EMV
-
LNCS. Springer, Heidelberg, Feb
-
Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, and Mario Strefler. "On the Joint Security of Encryption and Signature in EMV". In: CT-RSA 2012. Vol. 7178. LNCS. Springer, Heidelberg, Feb. 2012, pp. 116-135.
-
(2012)
CT-RSA 2012
, vol.7178
, pp. 116-135
-
-
Paul Degabriele, J.1
Lehmann, A.2
Paterson, K.G.3
Smart, N.P.4
Strefler, M.5
-
16
-
-
34547254779
-
Deniable authentication and key exchange
-
ACM Press, Oct
-
Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk. "Deniable authentication and key exchange". In: ACM CCS 06. ACM Press, Oct. 2006, pp. 400-409.
-
(2006)
ACM CCS 06
, pp. 400-409
-
-
Di Raimondo, M.1
Gennaro, R.2
Krawczyk, H.3
-
17
-
-
33749021102
-
Secure off-the-record messaging
-
Alexandria, VA, USA: ACM
-
Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk. "Secure Off-the-record Messaging". In: WPES. Alexandria, VA, USA: ACM, 2005, pp. 81-89.
-
(2005)
WPES
, pp. 81-89
-
-
Di Raimondo, M.1
Gennaro, R.2
Krawczyk, H.3
-
18
-
-
84954140761
-
A cryptographic analysis of the TLS 1.3 handshake protocol candidates
-
ACM Press, Oct
-
Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila. "A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates". In: ACM CCS 15. ACM Press, Oct. 2015, pp. 1197-1210.
-
(2015)
ACM CCS 15
, pp. 1197-1210
-
-
Dowling, B.1
Fischlin, M.2
Günther, F.3
Stebila, D.4
-
19
-
-
85024497839
-
-
Electronic Frontier Foundation
-
Electronic Frontier Foundation. Secure Messaging Scorecard. 2016. URL: https://www.eff.org/node/82654.
-
(2016)
Secure Messaging Scorecard
-
-
-
20
-
-
85026656402
-
-
Tech. rep. (visited on 07/2016)
-
Facebook. Messenger Secret Conversations. Tech. rep. 2016. URL: https://fbnewsroomus.files.wordpress.com/2016/07/ secret-conversations-whitepaper-1.pdf (visited on 07/2016).
-
(2016)
Messenger Secret Conversations
-
-
-
21
-
-
85026673215
-
-
Cryptology ePrint Archive, Report 2014/904 (Version from April 5, 2016)
-
Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Joerg Schwenk, and Thorsten Holz. How Secure is TextSecure? Cryptology ePrint Archive, Report 2014/904. http://eprint.iacr.org/2014/904 (Version from April 5, 2016). 2014.
-
(2014)
How Secure Is TextSecure
-
-
Frosch, T.1
Mainka, C.2
Bader, C.3
Bergsma, F.4
Schwenk, J.5
Holz, T.6
-
22
-
-
84978062340
-
How Secure is TextSecure?
-
IEEE Computer Society Press, Mar
-
Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, and Thorsten Holz. "How Secure is TextSecure?" In: 1st IEEE European Symposium on Security and Privacy. IEEE Computer Society Press, Mar. 2016.
-
(2016)
1st IEEE European Symposium on Security and Privacy
-
-
Frosch, T.1
Mainka, C.2
Bader, C.3
Bergsma, F.4
Schwenk, J.5
Holz, T.6
-
24
-
-
84945182231
-
Forward secure asynchronous messaging from puncturable encryption
-
IEEE Computer Society Press, May
-
Matthew D. Green and Ian Miers. "Forward Secure Asynchronous Messaging from Puncturable Encryption". In: 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 2015, pp. 305-320.
-
(2015)
2015 IEEE Symposium on Security and Privacy
, pp. 305-320
-
-
Green, M.D.1
Miers, I.2
-
25
-
-
84865461888
-
On the security of TLS-DHE in the standard model
-
LNCS. Springer, Heidelberg, Aug
-
Tibor Jager, Florian Kohlar, Sven Schäge, and Jörg Schwenk. "On the Security of TLS-DHE in the Standard Model". In: CRYPTO 2012. Vol. 7417. LNCS. Springer, Heidelberg, Aug. 2012, pp. 273-293.
-
(2012)
CRYPTO 2012
, vol.7417
, pp. 273-293
-
-
Jager, T.1
Kohlar, F.2
Schäge, S.3
Schwenk, J.4
-
26
-
-
84954113686
-
On the security of TLS 1.3 and QUIC against weaknesses in PKCS#1 v1.5 encryption
-
ACM Press, Oct
-
Tibor Jager, Jörg Schwenk, and Juraj Somorovsky. "On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption". In: ACM CCS 15. ACM Press, Oct. 2015, pp. 1185-1196.
-
(2015)
ACM CCS 15
, pp. 1185-1196
-
-
Jager, T.1
Schwenk, J.2
Somorovsky, J.3
-
27
-
-
84889036706
-
-
(visited on 07/2016)
-
Nadim Kobeissi. Cryptocat. URL: https://crypto.cat/security. html (visited on 07/2016).
-
Cryptocat
-
-
Kobeissi, N.1
-
28
-
-
85024477053
-
Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic and Computational Approach
-
IEEE Computer Society Press, Apr
-
Nadim Kobeissi, Karthikeyan Bhargavan, and Bruno Blanchet. "Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic and Computational Approach". In: 2nd IEEE European Symposium on Security and Privacy. IEEE Computer Society Press, Apr. 2017.
-
(2017)
2nd IEEE European Symposium on Security and Privacy
-
-
Kobeissi, N.1
Bhargavan, K.2
Blanchet, B.3
-
29
-
-
84951872326
-
De-)constructing TLS 1.3
-
LNCS. Springer, Heidelberg, Dec
-
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, and Daniele Venturi. "(De-)Constructing TLS 1.3". In: INDOCRYPT 2015. Vol. 9462. LNCS. Springer, Heidelberg, Dec. 2015, pp. 85-102.
-
(2015)
INDOCRYPT 2015
, vol.9462
, pp. 85-102
-
-
Kohlweiss, M.1
Maurer, U.2
Onete, C.3
Tackmann, B.4
Venturi, D.5
-
30
-
-
77957013995
-
Cryptographic extraction and key derivation: The HKDF scheme
-
LNCS. Springer, Heidelberg, Aug
-
Hugo Krawczyk. "Cryptographic Extraction and Key Derivation: The HKDF Scheme". In: CRYPTO 2010. Vol. 6223. LNCS. Springer, Heidelberg, Aug. 2010, pp. 631-648.
-
(2010)
CRYPTO 2010
, vol.6223
, pp. 631-648
-
-
Krawczyk, H.1
-
31
-
-
33745179557
-
Hmqv: A high-performance secure diffie-hellman protocol
-
LNCS. Springer, Heidelberg, Aug
-
Hugo Krawczyk. "HMQV: A High-Performance Secure Diffie-Hellman Protocol". In: CRYPTO 2005. Vol. 3621. LNCS. Springer, Heidelberg, Aug. 2005, pp. 546-566.
-
(2005)
CRYPTO 2005
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
32
-
-
33646756559
-
Modular security proofs for key agreement protocols
-
LNCS. Springer, Heidelberg, Dec
-
Caroline Kudla and Kenneth G. Paterson. "Modular Security Proofs for Key Agreement Protocols". In: ASIACRYPT 2005. Vol. 3788. LNCS. Springer, Heidelberg, Dec. 2005, pp. 549-565.
-
(2005)
ASIACRYPT 2005
, vol.3788
, pp. 549-565
-
-
Kudla, C.1
Paterson, K.G.2
-
33
-
-
38149012093
-
Stronger security of authenticated key exchange
-
LNCS. Springer, Heidelberg, Nov
-
Brian A. LaMacchia, Kristin Lauter, and Anton Mityagin. "Stronger Security of Authenticated Key Exchange". In: ProvSec 2007. Vol. 4784. LNCS. Springer, Heidelberg, Nov. 2007, pp. 1-16.
-
(2007)
ProvSec 2007
, vol.4784
, pp. 1-16
-
-
LaMacchia, B.A.1
Lauter, K.2
Mityagin, A.3
-
34
-
-
84985922270
-
-
(visited on 06/22/2015)
-
Adam Langley. Pond. 2014. URL: https://pond.imperialviolet. org/ (visited on 06/22/2015).
-
(2014)
Pond
-
-
Langley, A.1
-
35
-
-
84987602328
-
Multiple handshakes security of TLS 1.3 candidates
-
IEEE Computer Society Press, May
-
Xinyu Li, Jing Xu, Zhenfeng Zhang, Dengguo Feng, and Honggang Hu. "Multiple Handshakes Security of TLS 1.3 Candidates". In: 2016 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 2016.
-
(2016)
2016 IEEE Symposium on Security and Privacy
-
-
Li, X.1
Xu, J.2
Zhang, Z.3
Feng, D.4
Hu, H.5
-
39
-
-
84857829372
-
On reusing ephemeral keys in diffie-hellman key agreement protocols
-
Jan
-
Alfred Menezes and Berkant Ustaoglu. "On Reusing Ephemeral Keys in Diffie-Hellman Key Agreement Protocols". In: Int. J. Appl. Cryptol. 2.2 (Jan. 2010), pp. 154-158.
-
(2010)
Int. J. Appl. Cryptol
, vol.2
, Issue.2
, pp. 154-158
-
-
Menezes, A.1
Ustaoglu, B.2
-
40
-
-
84904134785
-
-
Tech. rep. Archived from the original. Dec. 5, (visited on 07/2016)
-
Vinnie Moscaritolo, Gary Belvin, and Phil Zimmermann. Silent Circle Instant Messaging Protocol Specification. Tech. rep. Archived from the original. Dec. 5, 2012. URL: https: //web.archive.org/web/20150402122917/https://silentcircle. com/ sites / default / themes / silentcircle / assets / downloads / SCIMP-paper.pdf (visited on 07/2016).
-
(2012)
Silent Circle Instant Messaging Protocol Specification
-
-
Moscaritolo, V.1
Belvin, G.2
Zimmermann, P.3
-
41
-
-
82955177026
-
On the joint security of encryption and signature, revisited
-
LNCS. Springer, Heidelberg, Dec
-
Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, and Susan Thomson. "On the Joint Security of Encryption and Signature, Revisited". In: ASIACRYPT 2011. Vol. 7073. LNCS. Springer, Heidelberg, Dec. 2011, pp. 161-178.
-
(2011)
ASIACRYPT 2011
, vol.7073
, pp. 161-178
-
-
Paterson, K.G.1
Schuldt, J.C.N.2
Stam, M.3
Thomson, S.4
-
42
-
-
85026638946
-
-
GitHub wiki (visited on 07/22/2016)
-
Trevor Perrin. Double Ratchet Algorithm. GitHub wiki. 2016. URL: https://github.com/trevp/double-ratchet/wiki (visited on 07/22/2016).
-
(2016)
Double Ratchet Algorithm
-
-
Perrin, T.1
-
43
-
-
85026640949
-
-
Specification. Oct. (visited on 07/2016)
-
Trevor Perrin. The XEdDSA and VXEdDSA Signature Schemes. Specification. Oct. 2016. URL: https: / / whispersystems. org / docs / specifications / xeddsa/ (visited on 07/2016).
-
(2016)
The XEdDSA and VXEdDSA Signature Schemes
-
-
Perrin, T.1
-
44
-
-
85026638946
-
-
Specification. Nov. (visited on 01/2017)
-
Trevor Perrin and Moxie Marlinspike. The Double Ratchet Algorithm. Specification. Nov. 2016. URL: https: / / whispersystems. org / docs / specifications / doubleratchet/ (visited on 01/2017).
-
(2016)
The Double Ratchet Algorithm
-
-
Perrin, T.1
Marlinspike, M.2
-
45
-
-
85026679673
-
-
Specification. Nov. (visited on 01/2017)
-
Trevor Perrin and Moxie Marlinspike. The X3DH Key Agreement Protocol. Specification. Nov. 2016. URL: https: //whispersystems.org/docs/specifications/x3dh/ (visited on 01/2017).
-
(2016)
The X3DH Key Agreement Protocol
-
-
Perrin, T.1
Marlinspike, M.2
-
47
-
-
85026633035
-
-
Oct. 25, (visited on 07/2016)
-
Andreas Straub. OMEMO Encryption. Oct. 25, 2015. URL: https://conversations.im/xeps/multi-end.html (visited on 07/2016).
-
(2015)
OMEMO Encryption
-
-
Straub, A.1
-
48
-
-
84945188762
-
SoK: Secure messaging
-
IEEE Computer Society Press, May
-
Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, and Matthew Smith. "SoK: Secure Messaging". In: 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 2015, pp. 232-249.
-
(2015)
2015 IEEE symposium on security and privacy
, pp. 232-249
-
-
Unger, N.1
Dechand, S.2
Bonneau, J.3
Fahl, S.4
Perl, H.5
Goldberg, I.6
Smith, M.7
-
49
-
-
84954146338
-
Deniable key exchanges for secure messaging
-
ACM Press, Oct
-
Nik Unger and Ian Goldberg. "Deniable Key Exchanges for Secure Messaging". In: ACM CCS 15. ACM Press, Oct. 2015, pp. 1211-1223.
-
(2015)
ACM CCS 15
, pp. 1211-1223
-
-
Unger, N.1
Goldberg, I.2
-
50
-
-
84979293776
-
-
Tech. rep. (visited on 07/2016)
-
WhatsApp. WhatsApp Encryption Overview. Tech. rep. 2016. URL: https: / /www. Whatsapp. com / security / WhatsApp-Security-Whitepaper.pdf (visited on 07/2016).
-
(2016)
WhatsApp Encryption Overview
-
-
|