About
7
Publications
1,383
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
19
Citations
Introduction
Current institution
Publications
Publications (7)
To introduce a post-quantum-secure encryption scheme specifically for use in flight-computers, we used avionics’ module-isolation methods to wrap a recent encryption standard (HPKE – Hybrid Public Key Encryption) within a software partition. This solution proposes an upgrade to HPKE, using quantum-resistant ciphers (Kyber/ML-KEM and Dilithium/ML-DS...
X-Wing is a hybrid key-encapsulation mechanism based on X25519 and ML-KEM-768. It is designed to be the sensible choice for most applications. The concrete choice of X25519 and ML-KEM-768 allows X-Wing to achieve improved efficiency compared to using a generic KEM combiner. In this paper, we introduce the X-Wing hybrid KEM construction and provide...
X-Wing is a hybrid key-encapsulation mechanism based on X25519 and ML-KEM-768. It is designed to be the sensible choice for most applications. The concrete choice of X25519 and ML-KEM-768 allows X-Wing to achieve improved efficiency compared to using a generic combiner. In this paper, we introduce the X-Wing construction and provide a proof of secu...
Recent reports from Tourette syndrome clinical researchers in North America and Europe1,2 describe a recent increase in young patients presenting to Tourette syndrome clinics. Reported commonalities in clinical presentation include a female preponderance, older age of first detected symptoms, complex behaviours (e.g. phrases, coprolalia, long/seque...
Recent reports from Tourette Syndrome (TS) multiple clinical researcher groups in North America and Europe describe a recent increase in young patients presenting to TS clinics. Reported commonalities include a female preponderance, older age of first detected symptoms, complex behaviors, significant functional impairment, and similarities to behav...
This paper introduces the notion of decryption despite errors: ciphers with forward error correction properties that provide specific security properties in relation to noise or adversarial error in the ciphertext. The two properties are security against fuzzing and partial message recovery. The latter refers to a ciphers ability to decrypt ciphert...
Combining FEC and encryption to achieve security against fuzzers and improve band-width efficiency. Karolin Varner ~ karo@cupdev.net https://github.com/koraa/decryption-despite-errors
See the presentation: https://www.youtube.com/watch?v=3D1V0C0eTIc
Questions
Question (1)
Common attacks such as meet in the middle attacks seem to rely on encryption of chosen blocks. What if the adversary can also decrypt arbitrary outputs adaptively?