Three lessons from threema: Analysis of a secure messenger KG Paterson, M Scarlata, KT Truong 32nd USENIX Security Symposium (USENIX Security 23), 1289-1306, 2023 | 25 | 2023 |
Cryptographic Security Analysis of T-310, Monography study on the T-310 block cipher, 132 pages, received 20 May 2017, last revised 29 June 2018 NT Courtois, K Schmeh, J Drobick, J Patarin, MB Oprisanu, M Scarlata, ... | 12 | |
When Messages are Keys: Is HMAC a dual-PRF? M Backendal, M Bellare, F Günther, M Scarlata 43rd International Cryptology Conference (CRYPTO 2023), 2023 | 9 | 2023 |
Slide attacks and LC-weak keys in T-310 NT Courtois, M Georgiou, M Scarlata Cryptologia 43 (3), 175-189, 2019 | 7 | 2019 |
Cryptographic security analysis of T-310 NT Courtois, K Schmeh, J Drobick, J Patarin, MB Oprisanu, M Scarlata, ... Cryptology ePrint Archive, 2017 | 6 | 2017 |
How many weak-keys exist in T-310 NT Courtois, M Scarlata, M Georgiou Tatra Mountains Mathematical Publications 73 (1), 61-82, 2019 | 3 | 2019 |
MFKDF: Multiple Factors Knocked Down Flat M Scarlata, M Backendal, M Haller Cryptology ePrint Archive, 2024 | | 2024 |
Post-Compromise Security and TLS 1.3 Session Resumption M Scarlata | | 2020 |
How Many Weak-Keys Exist in T-310 M Scarlata, M Georgiou Tatra Mountains Mathematical Publications 73 (1), 61-82, 2019 | | 2019 |