Integrating causality in messaging channels
From MaRDI portal
Publication:6637331
Recommendations
Cites work
- A message franking channel
- Asymmetric message franking: content moderation for metadata-private end-to-end encryption
- Beyond security and efficiency: on-demand ratcheting with security awareness
- Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity
- Data is a stream: security of stream-based channels
- Fast message franking: from invisible salamanders to encryptment
- From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS
- Integrating causality in messaging channels
- Keying hash functions for message authentication
- Message franking via committing authenticated encryption
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- On active attack detection in messaging with immediate decryption
- On secure ratcheting with immediate decryption
- On the security of TLS-DHE in the standard model
- Optimal channel security against fine-grained state compromise: the safety of messaging
- Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3
- Simplifying game-based definitions -- indistinguishability up to correctness and its application to stateful AE
- Tag size does matter: attacks and proofs for the TLS record protocol
- The double ratchet: security notions, proofs, and modularization for the signal protocol
- Time, clocks, and the ordering of events in a distributed system
This page was built for publication: Integrating causality in messaging channels
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6637331)