COD-ssi enables mutual privacy in SSI credential exchanges by using OPRFs for claim-oblivious disclosure, with formal security verification and a prototype showing moderate overhead.
The Transport Layer Security (TLS) Protocol Version 1.3
5 Pith papers cite this work. Polarity classification is still indexing.
years
2026 5verdicts
UNVERDICTED 5representative citing papers
FORGE enforces security policies in agentic systems via Datalog over abstract predicates with an observability service and reference monitor that guarantees policy semantics when the environment contract holds.
A new multi-surface evidence framework for post-quantum TLS observability that combines passive, active, certificate, and registry data to assess endpoint capabilities across TLS 1.2/1.3 scenarios and outperforms prior analyzers in controlled tests and public campaigns.
Placing SLH-DSA in the TLS server leaf certificate causes orders-of-magnitude higher handshake latency and server compute cost than confining it to upper certificate layers while using ML-DSA at the leaf.
Proposes information-theoretic bootstrapping for seedless QRNGs from two independent sources and hybrid PQC-QKD key combination via universal hash extractors that retain security properties.
citing papers explorer
-
COD-ssi: Enforcing Mutual Privacy for Credential Oblivious Disclosure in Self Sovereign Identity
COD-ssi enables mutual privacy in SSI credential exchanges by using OPRFs for claim-oblivious disclosure, with formal security verification and a prototype showing moderate overhead.
-
Formal Policy Enforcement for Real-World Agentic Systems
FORGE enforces security policies in agentic systems via Datalog over abstract predicates with an observability service and reference monitor that guarantees policy semantics when the environment contract holds.
-
Observability for Post-Quantum TLS Readiness: A Multi-Surface Evidence Framework
A new multi-surface evidence framework for post-quantum TLS observability that combines passive, active, certificate, and registry data to assess endpoint capabilities across TLS 1.2/1.3 scenarios and outperforms prior analyzers in controlled tests and public campaigns.
-
Signature Placement in Post-Quantum TLS Certificate Hierarchies: An Experimental Study of ML-DSA and SLH-DSA in TLS 1.3 Authentication
Placing SLH-DSA in the TLS server leaf certificate causes orders-of-magnitude higher handshake latency and server compute cost than confining it to upper certificate layers while using ML-DSA at the leaf.
-
Information-Theoretic Solutions for Seedless QRNG Bootstrapping and Hybrid PQC-QKD Key Combination
Proposes information-theoretic bootstrapping for seedless QRNGs from two independent sources and hybrid PQC-QKD key combination via universal hash extractors that retain security properties.