First Page | Document Content | |
---|---|---|
Date: 2018-10-15 14:18:42Cryptography Computing Internet Internet protocols Public-key cryptography Transport Layer Security Secure communication Cryptographic protocols QUIC Transmission Control Protocol Forward secrecy | Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ May 3, 2018—Eurocrypt 2018, Tel Aviv, IsraelAdd to Reading ListSource URL: david.derler.infoDownload Document from Source WebsiteFile Size: 702,00 KBShare Document on Facebook |
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2DocID: 1xVxZ - View Document | |
Imperfect Forward Secrecy: How Diffie-Hellman Fails in PracticeDocID: 1xTsq - View Document | |
0-RTT Key Exchange with Full Forward Secrecy Felix Günther Technische Universität Darmstadt, GermanyDocID: 1vmjh - View Document | |
Intro to Onion Routing Sphinx: A Compact and Provably Secure Mix Format HORNET: High-speed Onion Routing at the Network Layer Forward Secrecy Security Assumptions Future DirectionsDocID: 1uRkl - View Document | |
Imperfect Forward Secrecy: How Diffie-Hellman Fails in PracticeDocID: 1ucJx - View Document |