From 4f2b2a9d34abee2db37efeab35258e0a8b3badc3b2668325cae462a5ffe27940 Mon Sep 17 00:00:00 2001 From: Nadim Kobeissi Date: Wed, 2 Jul 2025 11:25:02 +0200 Subject: [PATCH] Topic 2.3: add optional reading --- slides/2-5.tex | 2 ++ website/index.html | 2 ++ website/papers/johnny-protocol.pdf | 3 +++ 3 files changed, 7 insertions(+) create mode 100644 website/papers/johnny-protocol.pdf diff --git a/slides/2-5.tex b/slides/2-5.tex index 4741005..562d3e9 100644 --- a/slides/2-5.tex +++ b/slides/2-5.tex @@ -22,6 +22,8 @@ \end{itemize} \end{frame} +\section{Introduction} + \begin{frame}{Perfect security and confidence} \begin{itemize} \item In 1949, Claude Shannon proved that symmetric encryption achieves perfect confidentiality only when the key is longer than the message it encrypts diff --git a/website/index.html b/website/index.html index e40b802..8338c48 100755 --- a/website/index.html +++ b/website/index.html @@ -198,6 +198,7 @@
  • Christina Garman, Kenneth G. Paterson and Thyla Van der Merwe, Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS, USENIX Security Symposium, 2015.
  • Nadim Kobeissi, Karthikeyan Bhargavan and Bruno Blanchet, Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic and Computational Approach, IEEE European Symposium on Security and Privacy, 2017.
  • Théophile Wallez, A Verification Framework for Secure Group Messaging, PSL Université Paris, 2025.
  • +
  • Ksenia Ermoshina, Harry Halpin, Francesca Musiani, Can Johnny Build a Protocol? Co-ordinating Developer and User Intentions for Privacy-Enhanced Secure Messaging Protocols, European Workshop on Systems Security, 2017.
  • Greg Aloupis, Erik D. Demaine, Alan Guo and Giovanni Viglietta, Classic Nintendo Games are (Computationally) Hard, ACM Theoretical Computer Science, 2015.
  • Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G. Paterson, Narseo Vallina-Rodriguez and Juan Caballero, Coming of Age: A Longitudinal Study of TLS Deployment, ACM IMC, 2018.
  • Hugo Krawczyk, Cryptographic Extraction and Key Derivation: The HKDF Scheme, IACR Crypto, 2010.
  • @@ -517,6 +518,7 @@