srTLS: Secure TLS Handshake on Corrupted Machines

J Liu, Y Wang, X Tang, R Chen… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
TLS 1.3 is widely used to realize secure communication over the Internet. Existing security
analyses of TLS 1.3 primarily focus on its handshake protocol which is indeed an …

Subverting Cryptographic Protocols from a Fine-Grained Perspective-A Case Study on 2-Party ECDSA

J Cheng, Y Wang, R Chen, X Huang - Australasian Conference on …, 2024 - Springer
Abstract The revelations of Edward Snowden in 2013 rekindled concerns within the
cryptographic community regarding the potential subversion of cryptographic systems …

Protection Against Subversion Corruptions via Reverse Firewalls in the plain Universal Composability Framework

P Arnold, S Berndt, J Müller-Quade… - Cryptology ePrint …, 2023 - eprint.iacr.org
While many modern cryptographic primitives have stood the test of time, attacker have
already begun to expand their attacks beyond classical cryptanalysis by specifically …

Cryptographic Reverse Firewall for Digital Signature in Fog Computing

B Kang, H Lian, X Zhou, W Zhou - 2023 6th International …, 2023 - ieeexplore.ieee.org
Fog computing (FC) is introduced as an extended technique of cloud computing. FC makes
it possible to compute straightly on the brim of the network. In FC application systems …