Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
From MaRDI portal
Publication:3102197
DOI10.1007/978-3-642-25385-0_20zbMath1227.94060OpenAlexW39167138MaRDI QIDQ3102197
Thomas Ristenpart, Kenneth G. Paterson, Thomas Shrimpton
Publication date: 2 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_20
Cryptography (94A60) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (12)
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC ⋮ Data Is a Stream: Security of Stream-Based Channels ⋮ On fingerprinting attacks and length-hiding encryption ⋮ Modelling Ciphersuite and Version Negotiation in the TLS Protocol ⋮ On Symmetric Encryption with Distinguishable Decryption Failures ⋮ Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3 ⋮ Authenticated confidential channel establishment and the security of TLS-DHE ⋮ Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC ⋮ Privacy-preserving authenticated key exchange and the case of IKEv2 ⋮ Identity-based authenticated encryption with identity confidentiality
This page was built for publication: Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol