On the concrete security of TLS 1.3 PSK mode
From MaRDI portal
Publication:2170074
DOI10.1007/978-3-031-07085-3_30zbMath1496.94038OpenAlexW4285192506MaRDI QIDQ2170074
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-07085-3_30
Uses Software
Cites Work
- Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy
- Practical and tightly-secure digital signatures and authenticated key exchange
- A cryptographic analysis of the TLS 1.3 handshake protocol
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments
- Tightly-secure authenticated key exchange, revisited
- More efficient digital signatures with tight multi-user security
- Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols
- Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability
- Authenticated key exchange and signatures with tight security in the standard model
- Highly efficient key exchange protocols with optimal tightness
- Two-pass authenticated key exchange with explicit authentication and tight security
- On the Security of the TLS Protocol: A Systematic Analysis
- Proving the TLS Handshake Secure (As It Is)
- On the Security of TLS-DHE in the Standard Model
- To Hash or Not to Hash Again? (In)Differentiability Results for $$H^2$$ and HMAC
- ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
- Modelling Ciphersuite and Version Negotiation in the TLS Protocol
- Cryptographic Extraction and Key Derivation: The HKDF Scheme
- Tightly-Secure Authenticated Key Exchange
- On the Security of the Pre-shared Key Ciphersuites of TLS
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- On the Impossibility of Tight Cryptographic Reductions
- Theory of Cryptography
This page was built for publication: On the concrete security of TLS 1.3 PSK mode