{"id":"https://openalex.org/W2085179296","doi":"https://doi.org/10.1145/2810103.2813657","title":"On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption","display_name":"On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W2085179296","doi":"https://doi.org/10.1145/2810103.2813657","mag":"2085179296"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2813657","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090157645","display_name":"Tibor Jager","orcid":"https://orcid.org/0000-0002-3205-7699"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Tibor Jager","raw_affiliation_strings":["Horst G\u00f6rtz Institute, Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053201224","display_name":"J\u00f6rg Schwenk","orcid":"https://orcid.org/0000-0001-9315-7354"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"J\u00f6rg Schwenk","raw_affiliation_strings":["Horst G\u00f6rtz Institute, Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091741421","display_name":"Juraj Somorovsky","orcid":"https://orcid.org/0000-0002-3593-7720"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Juraj Somorovsky","raw_affiliation_strings":["Horst G\u00f6rtz Institute, Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5090157645"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":13.3528,"has_fulltext":false,"cited_by_count":74,"citation_normalized_percentile":{"value":0.98710208,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1185","last_page":"1196"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7189458012580872},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.6933642625808716},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6226367950439453},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.567325234413147},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5663048028945923},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.5297071933746338},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.519938588142395},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.5137079954147339},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.476098895072937},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43519628047943115},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.23950913548469543},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.06184837222099304}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7189458012580872},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.6933642625808716},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6226367950439453},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.567325234413147},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5663048028945923},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.5297071933746338},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.519938588142395},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.5137079954147339},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.476098895072937},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43519628047943115},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.23950913548469543},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.06184837222099304}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2810103.2813657","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.704.8136","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.704.8136","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.nds.rub.de/media/nds/veroeffentlichungen/2015/08/21/Tls13QuicAttacks.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W185864230","https://openalex.org/W189766157","https://openalex.org/W1452942402","https://openalex.org/W1519351129","https://openalex.org/W1623551255","https://openalex.org/W1673604584","https://openalex.org/W1681309784","https://openalex.org/W1729100754","https://openalex.org/W1733713784","https://openalex.org/W1788164537","https://openalex.org/W1809974132","https://openalex.org/W1886381013","https://openalex.org/W1992291252","https://openalex.org/W2001759130","https://openalex.org/W2041428801","https://openalex.org/W2042923641","https://openalex.org/W2094250919","https://openalex.org/W2119028650","https://openalex.org/W2145994642","https://openalex.org/W2164428090","https://openalex.org/W2166093784","https://openalex.org/W2264455477","https://openalex.org/W2266218113","https://openalex.org/W2397911851","https://openalex.org/W2461796879","https://openalex.org/W2916447643","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3006652224","https://openalex.org/W2947414929","https://openalex.org/W110317680","https://openalex.org/W199384068","https://openalex.org/W2359065662","https://openalex.org/W2604277541","https://openalex.org/W2790635691","https://openalex.org/W2947337737","https://openalex.org/W4285207525","https://openalex.org/W2027004105"],"abstract_inverted_index":{"Encrypted":[0],"key":[1,11,64,96],"transport":[2,97],"with":[3,93],"RSA-PKCS#1":[4,77,108],"v1.5":[5,78],"is":[6,49,79,100],"the":[7,19,26,62],"most":[8,27,37],"commonly":[9],"deployed":[10],"exchange":[12],"method":[13],"in":[14,107],"all":[15],"current":[16,86],"versions":[17],"of":[18,73,88],"Transport":[20],"Layer":[21],"Security":[22],"(TLS)":[23],"protocol,":[24],"including":[25],"recent":[28],"version":[29,90],"1.2.":[30],"However,":[31],"it":[32,40,48],"has":[33],"several":[34],"well-known":[35],"issues,":[36],"importantly":[38],"that":[39,47,55,76],"does":[41],"not":[42],"provide":[43],"forward":[44],"secrecy,":[45],"and":[46],"prone":[50],"to":[51,60,82,103],"side":[52],"channel":[53],"attacks":[54,74],"may":[56],"enable":[57],"an":[58],"attacker":[59],"learn":[61],"session":[63],"used":[65],"for":[66],"a":[67],"TLS":[68,89],"session.":[69],"A":[70],"long":[71],"history":[72],"shows":[75],"extremely":[80],"difficult":[81],"implement":[83],"securely.":[84],"The":[85],"draft":[87],"1.3":[91],"dispenses":[92],"this":[94,101],"encrypted":[95],"method.":[98],"But":[99],"sufficient":[102],"protect":[104],"against":[105],"weaknesses":[106],"v1.5?":[109]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":15},{"year":2016,"cited_by_count":7}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
