Author of the publication

Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal.

. CANS, volume 14342 of Lecture Notes in Computer Science, page 251-267. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal.. CANS, volume 14342 of Lecture Notes in Computer Science, page 251-267. Springer, (2023)Authentication Key Recovery on Galois/Counter Mode (GCM)., and . AFRICACRYPT, volume 9646 of Lecture Notes in Computer Science, page 127-143. Springer, (2016)Evaluation of VoIP media security for smartphones in the context of IMS., , and . Swe-CTW, page 123-128. IEEE, (2011)Nori: Concealing the Concealed Identifier in 5G., and . ARES, page 105:1-105:7. ACM, (2021)