Data Is a Stream: Security of Stream-Based Channels
From MaRDI portal
Publication:3457084
DOI10.1007/978-3-662-48000-7_27zbMath1369.94535OpenAlexW1627549671MaRDI QIDQ3457084
Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson, Marc Fischlin
Publication date: 10 December 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48000-7_27
Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30)
Related Items (7)
Hidden shift quantum cryptanalysis and implications ⋮ Key-schedule security for the TLS 1.3 standard ⋮ Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3 ⋮ Simulatable channels: extended security that is universally composable and easier to prove ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC ⋮ The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3
Cites Work
- On the Security of the TLS Protocol: A Systematic Analysis
- Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
- On the Security of TLS-DHE in the Standard Model
- Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
- Breaking and provably repairing the SSH authenticated encryption scheme
- Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
- Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization
This page was built for publication: Data Is a Stream: Security of Stream-Based Channels