Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3
From MaRDI portal
Publication:6151601
DOI10.1007/S00145-023-09489-9OpenAlexW3037299701MaRDI QIDQ6151601FDOQ6151601
Authors: Marc Fischlin, Felix Günther, Christian Janson
Publication date: 11 March 2024
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-023-09489-9
Cryptography (94A60) Channel models (including quantum) in information and communication theory (94A40) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Robust Encryption
- Title not available (Why is that?)
- Breaking and repairing GCM security proofs
- Data is a stream: security of stream-based channels
- On the security of TLS-DHE in the standard model
- The double ratchet: security notions, proofs, and modularization for the signal protocol
- Security of symmetric encryption in the presence of ciphertext fragmentation
- Breaking and provably repairing the SSH authenticated encryption scheme
- Ratcheted encryption and key exchange: the security of messaging
- The multi-user security of authenticated encryption: AES-GCM in TLS 1.3
- Optimal channel security against fine-grained state compromise: the safety of messaging
- A formal treatment of multi-key channels
- Tag size does matter: attacks and proofs for the TLS record protocol
- Simplifying game-based definitions -- indistinguishability up to correctness and its application to stateful AE
- Nonces are noticed: AEAD revisited
- From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS
- Title not available (Why is that?)
- Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels
Cited In (1)
This page was built for publication: Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6151601)