{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:17:57Z","timestamp":1775470677189,"version":"3.50.1"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030236953","type":"print"},{"value":"9783030236960","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23696-0_1","type":"book-chapter","created":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T23:23:13Z","timestamp":1562023393000},"page":"3-20","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Tiny WireGuard Tweak"],"prefix":"10.1007","author":[{"given":"Jacob","family":"Appelbaum","sequence":"first","affiliation":[]},{"given":"Chloe","family":"Martindale","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"issue":"3","key":"1_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/2684097.2684099","volume":"44","author":"AA Adams","year":"2014","unstructured":"Adams, A.A.: Report of a debate on Snowden\u2019s actions by ACM members. SIGCAS Comput. Soc. 44(3), 5\u20137 (2014). https:\/\/doi.org\/10.1145\/2684097.2684099","journal-title":"SIGCAS Comput. Soc."},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-642-34931-7_28","volume-title":"Progress in Cryptology - INDOCRYPT 2012","author":"J-P Aumasson","year":"2012","unstructured":"Aumasson, J.-P., Bernstein, D.J.: SipHash: a fast short-input PRF. In: Galbraith, S., Nandi, M. (eds.) INDOCRYPT 2012. LNCS, vol. 7668, pp. 489\u2013508. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34931-7_28"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Barnes, R.L., Schneier, B., Jennings, C., Hardie, T., Trammell, B., Huitema, C., Borkmann, D.: Confidentiality in the face of pervasive surveillance: a threat model and problem statement. RFC 7624, pp. 1\u201324 (2015). https:\/\/doi.org\/10.17487\/RFC7624","DOI":"10.17487\/RFC7624"},{"key":"1_CR4","unstructured":"Gellman, B., Miller, G.: \u2018Black budget\u2019 summary details U.S. spy network\u2019s successes, failures and objectives (2013). https:\/\/www.washingtonpost.com\/world\/national-security\/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives\/2013\/08\/29\/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html, news article"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-662-44371-2_1","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"M Bellare","year":"2014","unstructured":"Bellare, M., Paterson, K.G., Rogaway, P.: Security of symmetric encryption against mass surveillance. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 1\u201319. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44371-2_1"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"DJ Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207\u2013228. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11745853_14"},{"key":"1_CR7","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-319-41763-9_20","volume-title":"Privacy and Identity Management. Time for a Revolution?","author":"F Bieker","year":"2016","unstructured":"Bieker, F.: Can courts provide effective remedies against violations of fundamental rights by mass surveillance? The case of the United Kingdom. In: Aspinall, D., Camenisch, J., Hansen, M., Fischer-H\u00fcbner, S., Raab, C. (eds.) Privacy and Identity 2015. IAICT, vol. 476, pp. 296\u2013311. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41763-9_20"},{"key":"1_CR8","unstructured":"Biondi, P.: Scapy (2010). http:\/\/www.secdev.org\/projects\/scapy\/, website"},{"key":"1_CR9","unstructured":"Cole, D.: Michael Hayden: \u201cwe kill people based on metadata\u201d (2014). https:\/\/www.justsecurity.org\/10311\/michael-hayden-kill-people-based-metadata\/, David Cole quoting former director of the CIA Michael Hayden"},{"key":"1_CR10","unstructured":"Combs, G., et. al.: Wireshark (1998\u20132019). https:\/\/www.wireshark.org\/"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/11558859_2","volume-title":"Information Hiding","author":"G Danezis","year":"2005","unstructured":"Danezis, G., Clulow, J.: Compulsion resistant anonymous communications. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 11\u201325. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11558859_2. http:\/\/www.freehaven.net\/anonbib\/cache\/ih05-danezisclulow.pdf"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Donenfeld, J.A.: WireGuard: next generation kernel network tunnel. In: 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, 26 February\u20131 March 2017. The Internet Society (2017). https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/wireguard-next-generation-kernel-network-tunnel\/","DOI":"10.14722\/ndss.2017.23160"},{"key":"1_CR13","unstructured":"Donenfeld, J.A.: Wireguard Black Hat 2018 talk slides (2018). https:\/\/www.wireguard.com\/talks\/blackhat2018-slides.pdf, see slide 41"},{"key":"1_CR14","unstructured":"Donenfeld, J.A.: WireGuard: next generation kernel network tunnel (2018). https:\/\/www.wireguard.com\/papers\/wireguard.pdf, version 416d63b 2018\u201306-30"},{"key":"1_CR15","unstructured":"Donenfeld, J.A.: Source code for the Go implementation of WireGuard (2019). https:\/\/git.zx2c4.com\/wireguard-go, commit c2a2b8d739cb"},{"key":"1_CR16","unstructured":"Donenfeld, J.A.: Source code for the Rust implementation of WireGuard (2019). https:\/\/git.zx2c4.com\/wireguard-rs, commit a7a2e5231571"},{"key":"1_CR17","unstructured":"Donenfeld, J.A.: WireGuard Android application source (2019). https:\/\/git.zx2c4.com\/wireguard-android\/"},{"key":"1_CR18","unstructured":"Donenfeld, J.A.: WireGuard Linux kernel source (2019). https:\/\/git.zx2c4.com\/WireGuard, tag 0.0.20190227, commit ab146d92c353"},{"key":"1_CR19","unstructured":"Donenfeld, J.A.: WireGuard MacOS and iOS application source (2019). https:\/\/git.zx2c4.com\/wireguard-ios\/"},{"key":"1_CR20","unstructured":"Donenfeld, J.A.: WireGuard Windows application source (2019). https:\/\/git.zx2c4.com\/wireguard-windows\/"},{"key":"1_CR21","unstructured":"Dumazet, E.: Linux kernel patch: ipv6: Limit mtu to 65575 bytes (2014). https:\/\/git.kernel.org\/linus\/30f78d8ebf7f514801e71b88a10c948275168518"},{"issue":"1","key":"1_CR22","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/S1363-4127(01)00106-6","volume":"6","author":"N Dunbar","year":"2001","unstructured":"Dunbar, N.: IPsec networking standards \u2013 an overview. Inf. Sec. Techn. Report 6(1), 35\u201348 (2001). https:\/\/doi.org\/10.1016\/S1363-4127(01)00106-6","journal-title":"Inf. Sec. Techn. Report"},{"key":"1_CR23","unstructured":"Erwin, M.: The Latest Rules on How Long NSA Can Keep Americans\u2019 Encrypted Data Look Too Familiar (2015). https:\/\/www.justsecurity.org\/19308\/congress-latest-rules-long-spies-hold-encrypted-data-familiar\/, blog entry"},{"key":"1_CR24","unstructured":"FreeBSD: Chapter 8. IPv6 Internals - Jumbo Payload. https:\/\/www.freebsd.org\/doc\/en\/books\/developers-handbook\/ipv6.html#ipv6-jumbo"},{"key":"1_CR25","unstructured":"Greenwald, G.: The crux of the NSA story in one phrase: \u2018collect it all\u2019 (2013). https:\/\/www.theguardian.com\/commentisfree\/2013\/jul\/15\/crux-nsa-collect-it-all, news article"},{"key":"1_CR26","unstructured":"Greenwald, G.: XKeyscore: NSA tool collects \u2018nearly everything a user does on the internet\u2019 (2013). https:\/\/www.theguardian.com\/world\/2013\/jul\/31\/nsa-top-secret-program-online-data"},{"issue":"2","key":"1_CR27","doi-asserted-by":"publisher","first-page":"205395171559242","DOI":"10.1177\/2053951715592429","volume":"2","author":"M Hogan","year":"2015","unstructured":"Hogan, M.: Data flows and water woes: the Utah data center. Big Data Soc. 2(2), 2053951715592429 (2015). https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/2053951715592429","journal-title":"Big Data Soc."},{"key":"1_CR28","doi-asserted-by":"publisher","unstructured":"Krawczyk, H., Eronen, P.: HMAC-based Extract-and-Expand Key Derivation Function (HKDF). RFC 5869, pp. 1\u201314 (2010). https:\/\/doi.org\/10.17487\/RFC5869","DOI":"10.17487\/RFC5869"},{"issue":"4","key":"1_CR29","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2013.90","volume":"11","author":"S Landau","year":"2013","unstructured":"Landau, S.: Making sense from Snowden: what\u2019s significant in the NSA surveillance revelations. IEEE Secur. Priv. 11(4), 54\u201363 (2013). https:\/\/doi.org\/10.1109\/MSP.2013.90","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"1_CR30","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MSP.2013.161","volume":"12","author":"S Landau","year":"2014","unstructured":"Landau, S.: Highlights from making sense of Snowden, Part II: what\u2019s significant in the NSA revelations. IEEE Secur. Priv. 12(1), 62\u201364 (2014). https:\/\/doi.org\/10.1109\/MSP.2013.161","journal-title":"IEEE Secur. Priv."},{"key":"1_CR31","unstructured":"Mullvad: Introducing a post-quantum VPN, Mullvad\u2019s strategy for a future problem. https:\/\/mullvad.net\/en\/blog\/2017\/12\/8\/introducing-post-quantum-vpn-mullvads-strategy-future-problem\/, blog post"},{"key":"1_CR32","unstructured":"Mullvad: mullvad-wg-establish-psk. https:\/\/github.com\/mullvad\/oqs-rs\/tree\/master\/mullvad-wg-establish-psk, source code post"},{"key":"1_CR33","doi-asserted-by":"publisher","unstructured":"Nir, Y., Langley, A.: ChaCha20 and Poly1305 for IETF Protocols. RFC 8439, pp. 1\u201346 (2018). https:\/\/doi.org\/10.17487\/RFC8439","DOI":"10.17487\/RFC8439"},{"key":"1_CR34","unstructured":"Perrin, T.: The Noise protocol framework (2018). https:\/\/noiseprotocol.org\/noise.html"},{"key":"1_CR35","doi-asserted-by":"publisher","unstructured":"Preneel, B.: Post-Snowden threat models. In: Weippl, E.R., Kerschbaum, F., Lee, A.J. (eds.) Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, Vienna, Austria, 1\u20133 June 2015, p. 1. ACM (2015). https:\/\/doi.org\/10.1145\/2752952.2752978","DOI":"10.1145\/2752952.2752978"},{"key":"1_CR36","unstructured":"Privacy and Civil Liberties Oversight Board: Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act (2014). https:\/\/www.pclob.gov\/library\/702-Report.pdf, July 2nd, 2014; see page 12"},{"key":"1_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-319-70697-9_9","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"M Roetteler","year":"2017","unstructured":"Roetteler, M., Naehrig, M., Svore, K.M., Lauter, K.: Quantum resource estimates for computing elliptic curve discrete logarithms. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017, Part II. LNCS, vol. 10625, pp. 241\u2013270. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70697-9_9"},{"key":"1_CR38","unstructured":"Rogaway, P.: The moral character of cryptographic work. IACR Cryptology ePrint Archive 2015, p. 1162 (2015). http:\/\/eprint.iacr.org\/2015\/1162"},{"key":"1_CR39","doi-asserted-by":"publisher","unstructured":"Saarinen, M.O., Aumasson, J.: The BLAKE2 cryptographic hash and message authentication code (MAC). RFC 7693, pp. 1\u201330 (2015). https:\/\/doi.org\/10.17487\/RFC7693","DOI":"10.17487\/RFC7693"},{"key":"1_CR40","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1515\/popets-2016-0037","volume":"4","author":"JM Schanck","year":"2016","unstructured":"Schanck, J.M., Whyte, W., Zhang, Z.: Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world. Proc. Priv. Enhancing Technol. 4, 219\u2013236 (2016). https:\/\/eprint.iacr.org\/2015\/287.pdf","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"1_CR41","doi-asserted-by":"publisher","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20\u201322 November 1994, pp. 124\u2013134. IEEE Computer Society (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"2","key":"1_CR42","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s00145-003-0213-5","volume":"17","author":"MJ Wiener","year":"2004","unstructured":"Wiener, M.J.: The full cost of cryptanalytic attacks. J. Cryptol. 17(2), 105\u2013124 (2004). https:\/\/doi.org\/10.1007\/s00145-003-0213-5","journal-title":"J. Cryptol."},{"key":"1_CR43","unstructured":"Wu, P.: Bug 15011 - Support for WireGuard VPN protocol (2018). https:\/\/bugs.wireshark.org\/bugzilla\/show_bug.cgi?id=15011"},{"key":"1_CR44","unstructured":"Yonan, J.: OpenVPN. https:\/\/openvpn.net\/. Accessed 11 Nov 2018"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23696-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:23:49Z","timestamp":1710260629000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-23696-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030236953","9783030236960"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23696-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in Africa","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africacrypt2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/africacrypt2019.aui.ma\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}