John Preuß Mattsson

Orcid: 0009-0005-3807-7665

According to our database1, John Preuß Mattsson authored at least 27 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis.
Computer, September, 2024

AutoPKI: public key infrastructure for IoT with automated trust transfer.
Int. J. Inf. Sec., June, 2024

Traces of Ephemeral Diffie-Hellman Over COSE (EDHOC).
RFC, March, 2024

Ephemeral Diffie-Hellman Over COSE (EDHOC).
RFC, March, 2024

Collision Attacks on Galois/Counter Mode (GCM).
IACR Cryptol. ePrint Arch., 2024

Security of Symmetric Ratchets and Key Chains - Implications for Protocols like TLS 1.3, Signal, and PQ3.
IACR Cryptol. ePrint Arch., 2024

Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols.
IEEE Access, 2024

A Single-Trace Fault Injection Attack on Hedged Module Lattice Digital Signature Algorithm (ML-DSA).
Proceedings of the Workshop on Fault Detection and Tolerance in Cryptography, 2024

2023
Extension of the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) to Transport Layer Security (TLS).
RFC, July, 2023

X.509 Certificate Extension for 5G Network Function Types.
RFC, January, 2023

Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal.
IACR Cryptol. ePrint Arch., 2023

2022
Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods.
RFC, February, 2022

EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3.
RFC, February, 2022

Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing.
RFC, February, 2022

Lightweight Authenticated Key Exchange With EDHOC.
Computer, 2022

2021
Encrypted Key Transport for DTLS and Secure RTP.
RFC, January, 2021

Quantum-Resistant Cryptography.
CoRR, 2021

Nori: Concealing the Concealed Identifier in 5G.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
The security implications of quantum cryptography and quantum computing.
Netw. Secur., 2020

2019
Object Security for Constrained RESTful Environments (OSCORE).
RFC, July, 2019

2018
ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites for TLS 1.2 and DTLS 1.2.
RFC, September, 2018

2017
Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH).
RFC, October, 2017

2016
Authentication Key Recovery on Galois/Counter Mode (GCM).
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
Authentication Key Recovery in Galois/Counter Mode (GCM).
IACR Cryptol. ePrint Arch., 2015

2011
IANA Rules for MIKEY (Multimedia Internet KEYing).
RFC, August, 2011

MIKEY-TICKET: Ticket-Based Modes of Key Distribution in Multimedia Internet KEYing (MIKEY).
RFC, March, 2011

Evaluation of VoIP media security for smartphones in the context of IMS.
Proceedings of the 2011 IEEE Swedish Communication Technologies Workshop, 2011


  Loading...