Security analysis of SFrame
As people become more and more privacy conscious, the need for end-to-end encryption (E2EE)
has become widely recognized. We study the security of SFrame, an E2EE mechanism …
has become widely recognized. We study the security of SFrame, an E2EE mechanism …
Automated Analysis of Protocols that use Authenticated Encryption: Analysing the Impact of the Subtle Differences between AEADs on Protocol Security
Many modern security protocols such as TLS, WPA2, WireGuard, and Signal use a cryptographic
primitive called Authenticated Encryption (optionally with Authenticated Data), also …
primitive called Authenticated Encryption (optionally with Authenticated Data), also …
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle {AEAD} Differences can impact Protocol Security
Many modern security protocols such as TLS, WPA2, WireGuard, and Signal use a cryptographic
primitive called Authenticated Encryption (optionally with Authenticated Data), also …
primitive called Authenticated Encryption (optionally with Authenticated Data), also …
Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend
This paper summarizes our cryptanalysis results on real-world End-to-End Encryption (E2EE)
schemes published in recent years. Our targets are LINE (a major messaging application), …
schemes published in recent years. Our targets are LINE (a major messaging application), …
[HTML][HTML] End-to-End Post-Quantum Cryptography Encryption Protocol for Video Conferencing System Based on Government Public Key Infrastructure
Y Park, H Yoo, J Ryu, YR Choi, JS Kang… - Applied System …, 2023 - mdpi.com
Owing to the expansion of non-face-to-face activities, security issues in video conferencing
systems are becoming more critical. In this paper, we focus on the end-to-end encryption (…
systems are becoming more critical. In this paper, we focus on the end-to-end encryption (…
End-to-End PQC Encryption Protocol for GPKI-Based Video Conferencing Systems
Y Park, H Yoo, J Ryu, YR Choi… - 2023 IEEE 3rd …, 2023 - ieeexplore.ieee.org
Due to the expansion of non-face-to-face activities, security issues in video conferencing
systems are becoming more critical. In this study, we investigate the end-to-end encryption (…
systems are becoming more critical. In this study, we investigate the end-to-end encryption (…
Key committing security of AEZ and more
For an Authenticated Encryption with Associated Data (AEAD) scheme, the key committing
security refers to the security notion of whether the adversary can produce a pair of distinct …
security refers to the security notion of whether the adversary can produce a pair of distinct …
[BOOK][B] Computer Security–ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings …
The two volume set LNCS 12972+ 12973 constitutes the proceedings of the 26th European
Symposium on Research in Computer Security, ESORICS 2021, which took place during …
Symposium on Research in Computer Security, ESORICS 2021, which took place during …
Areion: highly-efficient permutations and its applications to hash functions for short input
In the real-world applications, the overwhelming majority of cases require hashing with relatively
short input, say up to 2K bytes. The length of almost all TCP/IP packets is between 40 to …
short input, say up to 2K bytes. The length of almost all TCP/IP packets is between 40 to …
Areion: Highly-Efficient Permutations and Its Applications (Extended Version)
In real-world applications, the overwhelming majority of cases require (authenticated) encryption
or hashing with relatively short input, say up to 2K bytes. Almost all TCP/IP packets are …
or hashing with relatively short input, say up to 2K bytes. Almost all TCP/IP packets are …