2009 Annual Computer Security Applications Conference 2009
DOI: 10.1109/acsac.2009.42
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric Cryptography in Javascript

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(37 citation statements)
references
References 3 publications
0
37
0
Order By: Relevance
“…It preserves most of the functionality of Google Documents with low performance overhead. Our implementation uses a fast JavaScript implementation of AES developed by Stanford [33].…”
Section: Results and Evaluationmentioning
confidence: 99%
“…It preserves most of the functionality of Google Documents with low performance overhead. Our implementation uses a fast JavaScript implementation of AES developed by Stanford [33].…”
Section: Results and Evaluationmentioning
confidence: 99%
“…6 In a remarkable turn-around, Crypto.cat has since become the first formally verified Javascript-based cryptographic application. Although a number of well-designed Javascript cryptographic libraries exist such as the Stanford Javascript Crypto Library [38], there are certain properties even the most well-designed Javascript cryptography library presents, such as the problem of accessing the library itself securely. Although well-designed libraries can prevent this, common libraries OpenPGP.js 7 are vulnerable to side-channel attacks and critically use built-in weak number generation given by default by Math.random.…”
Section: Javascript Cryptographymentioning
confidence: 99%
“…While we are not aware of any implementations of package transform in pure JavaScript 3 , one can be constructed relatively by computing the BEAR-encryption [2] of M using an all-zero key. This can be implemented using standard symmetric primitives like AES and SHA, for which widely-used JavaScript libraries are now available [13].…”
Section: Outline Of a Practical Implementationmentioning
confidence: 99%