Integrating causality in messaging channels
From MaRDI portal
Publication:6637331
DOI10.1007/978-3-031-58734-4_9MaRDI QIDQ6637331FDOQ6637331
Authors: Shan Chen, Marc Fischlin
Publication date: 13 November 2024
Recommendations
Cites Work
- Time, clocks, and the ordering of events in a distributed system
- Keying hash functions for message authentication
- Data is a stream: security of stream-based channels
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- On the security of TLS-DHE in the standard model
- The double ratchet: security notions, proofs, and modularization for the signal protocol
- Optimal channel security against fine-grained state compromise: the safety of messaging
- Fast message franking: from invisible salamanders to encryptment
- Message franking via committing authenticated encryption
- On secure ratcheting with immediate decryption
- Tag size does matter: attacks and proofs for the TLS record protocol
- Simplifying game-based definitions -- indistinguishability up to correctness and its application to stateful AE
- From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS
- Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity
- Beyond security and efficiency: on-demand ratcheting with security awareness
- A message franking channel
- Asymmetric message franking: content moderation for metadata-private end-to-end encryption
- Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3
- On active attack detection in messaging with immediate decryption
- Integrating causality in messaging channels
Cited In (1)
This page was built for publication: Integrating causality in messaging channels
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6637331)