srTLS: Secure TLS Handshake on Corrupted Machines
J Liu, Y Wang, X Tang, R Chen… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
TLS 1.3 is widely used to realize secure communication over the Internet. Existing security
analyses of TLS 1.3 primarily focus on its handshake protocol which is indeed an …
analyses of TLS 1.3 primarily focus on its handshake protocol which is indeed an …
Subverting Cryptographic Protocols from a Fine-Grained Perspective-A Case Study on 2-Party ECDSA
J Cheng, Y Wang, R Chen, X Huang - Australasian Conference on …, 2024 - Springer
Abstract The revelations of Edward Snowden in 2013 rekindled concerns within the
cryptographic community regarding the potential subversion of cryptographic systems …
cryptographic community regarding the potential subversion of cryptographic systems …
Protection Against Subversion Corruptions via Reverse Firewalls in the plain Universal Composability Framework
P Arnold, S Berndt, J Müller-Quade… - Cryptology ePrint …, 2023 - eprint.iacr.org
While many modern cryptographic primitives have stood the test of time, attacker have
already begun to expand their attacks beyond classical cryptanalysis by specifically …
already begun to expand their attacks beyond classical cryptanalysis by specifically …
Cryptographic Reverse Firewall for Digital Signature in Fog Computing
B Kang, H Lian, X Zhou, W Zhou - 2023 6th International …, 2023 - ieeexplore.ieee.org
Fog computing (FC) is introduced as an extended technique of cloud computing. FC makes
it possible to compute straightly on the brim of the network. In FC application systems …
it possible to compute straightly on the brim of the network. In FC application systems …