Security analysis of SFrame

T Isobe, R Ito, K Minematsu - … : 26th European Symposium on Research in …, 2021 - Springer
As people become more and more privacy conscious, the need for end-to-end encryption (E2EE)
has become widely recognized. We study the security of SFrame, an E2EE mechanism …

Automated Analysis of Protocols that use Authenticated Encryption: Analysing the Impact of the Subtle Differences between AEADs on Protocol Security

C Cremers, A Dax, C Jacomme, M Zhao - USENIX Security 2023, 2023 - inria.hal.science
Many modern security protocols such as TLS, WPA2, WireGuard, and Signal use a cryptographic
primitive called Authenticated Encryption (optionally with Authenticated Data), also …

Automated Analysis of Protocols that use Authenticated Encryption: How Subtle {AEAD} Differences can impact Protocol Security

C Cremers, A Dax, C Jacomme, M Zhao - 32nd USENIX Security …, 2023 - usenix.org
Many modern security protocols such as TLS, WPA2, WireGuard, and Signal use a cryptographic
primitive called Authenticated Encryption (optionally with Authenticated Data), also …

Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend

T Isobe, R Ito, K Minematsu - Journal of Information Processing, 2023 - jstage.jst.go.jp
This paper summarizes our cryptanalysis results on real-world End-to-End Encryption (E2EE)
schemes published in recent years. Our targets are LINE (a major messaging application), …

[HTML][HTML] End-to-End Post-Quantum Cryptography Encryption Protocol for Video Conferencing System Based on Government Public Key Infrastructure

Y Park, H Yoo, J Ryu, YR Choi, JS Kang… - Applied System …, 2023 - mdpi.com
Owing to the expansion of non-face-to-face activities, security issues in video conferencing
systems are becoming more critical. In this paper, we focus on the end-to-end encryption (…

End-to-End PQC Encryption Protocol for GPKI-Based Video Conferencing Systems

Y Park, H Yoo, J Ryu, YR Choi… - 2023 IEEE 3rd …, 2023 - ieeexplore.ieee.org
Due to the expansion of non-face-to-face activities, security issues in video conferencing
systems are becoming more critical. In this study, we investigate the end-to-end encryption (…

Key committing security of AEZ and more

YL Chen, A Flórez-Gutiérrez, A Inoue, R Ito… - IACR Transactions on …, 2023 - tosc.iacr.org
For an Authenticated Encryption with Associated Data (AEAD) scheme, the key committing
security refers to the security notion of whether the adversary can produce a pair of distinct …

[BOOK][B] Computer Security–ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings …

E Bertino, H Shulman, M Waidner - 2021 - books.google.com
The two volume set LNCS 12972+ 12973 constitutes the proceedings of the 26th European
Symposium on Research in Computer Security, ESORICS 2021, which took place during …

Areion: highly-efficient permutations and its applications to hash functions for short input

T Isobe, R Ito, F Liu, K Minematsu… - IACR Transactions on …, 2023 - tches.iacr.org
In the real-world applications, the overwhelming majority of cases require hashing with relatively
short input, say up to 2K bytes. The length of almost all TCP/IP packets is between 40 to …

Areion: Highly-Efficient Permutations and Its Applications (Extended Version)

T Isobe, R Ito, F Liu, K Minematsu… - Cryptology ePrint …, 2023 - eprint.iacr.org
In real-world applications, the overwhelming majority of cases require (authenticated) encryption
or hashing with relatively short input, say up to 2K bytes. Almost all TCP/IP packets are …