{"id":"https://openalex.org/W4281400409","doi":"https://doi.org/10.1145/3488932.3517387","title":"ASAP","display_name":"ASAP","publication_year":2022,"publication_date":"2022-05-24","ids":{"openalex":"https://openalex.org/W4281400409","doi":"https://doi.org/10.1145/3488932.3517387"},"language":"en","primary_location":{"id":"doi:10.1145/3488932.3517387","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3488932.3517387","pdf_url":null,"source":{"id":"https://openalex.org/S4363609011","display_name":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017991461","display_name":"Sebastian Berndt","orcid":"https://orcid.org/0000-0003-4177-8081"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sebastian Berndt","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081651621","display_name":"Jan Wichelmann","orcid":"https://orcid.org/0000-0002-5748-5462"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jan Wichelmann","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080443652","display_name":"Claudius Pott","orcid":"https://orcid.org/0000-0002-1266-378X"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Claudius Pott","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048663118","display_name":"Tim-Henrik Traving","orcid":null},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Tim-Henrik Traving","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075079896","display_name":"Thomas Eisenbarth","orcid":"https://orcid.org/0000-0003-1116-6973"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Eisenbarth","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5017991461"],"corresponding_institution_ids":["https://openalex.org/I9341345"],"apc_list":null,"apc_paid":null,"fwci":1.4543,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.83721181,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"712","last_page":"726"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8069061040878296},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7129050493240356},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.6688821315765381},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6288008093833923},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6004958748817444},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5938632488250732},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.5101845264434814},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.46339184045791626},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.44814229011535645},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43856140971183777},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4328877925872803},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4307636618614197},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.20846956968307495},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1108761727809906},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08595523238182068}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8069061040878296},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7129050493240356},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.6688821315765381},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6288008093833923},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6004958748817444},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5938632488250732},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.5101845264434814},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.46339184045791626},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.44814229011535645},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43856140971183777},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4328877925872803},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4307636618614197},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20846956968307495},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1108761727809906},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08595523238182068},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3488932.3517387","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3488932.3517387","pdf_url":null,"source":{"id":"https://openalex.org/S4363609011","display_name":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.800000011920929,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W180983570","https://openalex.org/W639928820","https://openalex.org/W1499713421","https://openalex.org/W1855109561","https://openalex.org/W1873601359","https://openalex.org/W1892798954","https://openalex.org/W2105209441","https://openalex.org/W2117455301","https://openalex.org/W2129719496","https://openalex.org/W2219924285","https://openalex.org/W2243425628","https://openalex.org/W2262479410","https://openalex.org/W2268491029","https://openalex.org/W2270478131","https://openalex.org/W2286649377","https://openalex.org/W2395250232","https://openalex.org/W2401376465","https://openalex.org/W2406153758","https://openalex.org/W2561675875","https://openalex.org/W2598594926","https://openalex.org/W2601396684","https://openalex.org/W2612102454","https://openalex.org/W2733667569","https://openalex.org/W2746818215","https://openalex.org/W2884501650","https://openalex.org/W2886926540","https://openalex.org/W2915352631","https://openalex.org/W2950438744","https://openalex.org/W2962928921","https://openalex.org/W3037277476","https://openalex.org/W3080846549","https://openalex.org/W3089693180","https://openalex.org/W3157446831","https://openalex.org/W3168670086","https://openalex.org/W3175393859","https://openalex.org/W4210531213","https://openalex.org/W6649199530","https://openalex.org/W6675856022","https://openalex.org/W6692854719","https://openalex.org/W6692900590","https://openalex.org/W6696286977","https://openalex.org/W6726154832"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W4308361275","https://openalex.org/W2342603380","https://openalex.org/W1578158220"],"abstract_inverted_index":{"The":[0],"security":[1,51,96,106],"of":[2,81,98,111,118,148,164],"digital":[3],"communication":[4],"relies":[5],"on":[6,31],"few":[7,159],"cryptographic":[8,27,66,87],"protocols":[9,24,100,133],"that":[10,77,93,131,145],"are":[11,37,43],"used":[12,123],"to":[13,20,46,61,179],"protect":[14],"internet":[15],"traffic,":[16],"from":[17],"web":[18],"sessions":[19],"instant":[21],"messaging.":[22],"These":[23],"and":[25,36,104,127,166],"the":[26,78,109,116,162,182],"primitives":[28],"they":[29],"rely":[30],"have":[32],"been":[33],"extensively":[34],"studied":[35],"considered":[38],"secure.":[39],"Yet,":[40],"sophisticated":[41],"attackers":[42],"often":[44],"able":[45],"bypass":[47],"rather":[48],"than":[49],"break":[50],"mechanisms.":[52],"Kleptography":[53],"or":[54],"algorithm":[55],"substitution":[56],"attacks":[57],"(ASA)":[58],"describe":[59],"techniques":[60],"place":[62],"backdoors":[63],"right":[64],"into":[65],"primitives.":[67],"While":[68],"highly":[69,94],"relevant":[70],"as":[71,181],"a":[72,158],"building":[73],"block,":[74],"we":[75,91],"show":[76,92,130],"real":[79],"danger":[80],"ASAs":[82,119,149],"is":[83],"their":[84],"use":[85],"in":[86,120,161],"protocols.":[88],"In":[89,171],"fact,":[90],"desirable":[95],"properties":[97],"these":[99,132],"-":[101,107],"forward":[102],"secrecy":[103],"post-compromise":[105],"imply":[108],"applicability":[110],"ASAs.":[112,141],"We":[113,129],"then":[114],"analyze":[115],"application":[117],"three":[121],"widely":[122],"protocols:":[124],"TLS,":[125],"WireGuard,":[126,167],"Signal.":[128],"can":[134],"be":[135],"easily":[136],"subverted":[137],"by":[138],"carefully":[139],"placing":[140],"Our":[142],"analysis":[143],"shows":[144,176],"careful":[146],"design":[147],"makes":[150],"detection":[151],"unlikely":[152],"while":[153],"leaking":[154],"long-term":[155],"secrets":[156],"within":[157],"messages":[160],"case":[163],"TLS":[165],"allowing":[168],"impersonation":[169],"attacks.":[170],"contrast,":[172],"Signal's":[173],"double-ratchet":[174],"protocol":[175],"higher":[177],"immunity":[178],"ASAs,":[180],"leakage":[183],"requires":[184],"much":[185],"more":[186],"messages.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-05-25T00:00:00"}
