{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T23:48:53Z","timestamp":1769298533741,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1564444"],"award-info":[{"award-number":["CNS-1564444"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1816375"],"award-info":[{"award-number":["CNS-1816375"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243789","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1415-1428","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Partially Specified Channels"],"prefix":"10.1145","author":[{"given":"Christopher","family":"Patton","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Thomas","family":"Shrimpton","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978364"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.5"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.42"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_6"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26059-4_5"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27239-9_6"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996945"},{"key":"e_1_3_2_2_8_1","volume-title":"Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm. Cryptology ePrint Archive, Report 2000\/025. https:\/\/eprint.iacr.org\/2000\/025.","author":"Bellare Mihir","year":"2000","unstructured":"Mihir Bellare and Chanathip Namprempre . 2000 . Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm. Cryptology ePrint Archive, Report 2000\/025. https:\/\/eprint.iacr.org\/2000\/025. Mihir Bellare and Chanathip Namprempre. 2000. Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm. Cryptology ePrint Archive, Report 2000\/025. https:\/\/eprint.iacr.org\/2000\/025."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/647096.716998"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_25"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_10"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.14"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_40"},{"key":"e_1_3_2_2_14_1","volume-title":"Kenneth G. Paterson, and Martijn Stam.","author":"Boldyreva Alexandra","year":"2014","unstructured":"Alexandra Boldyreva , Jean Paul Degabriele , Kenneth G. Paterson, and Martijn Stam. 2014 . On Symmetric Encryption with Distinguishable Decryption Failures. In Fast Software Encryption. Springer Berlin Heidelberg , 367--390. Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, and Martijn Stam. 2014. On Symmetric Encryption with Distinguishable Decryption Failures. In Fast Software Encryption. Springer Berlin Heidelberg, 367--390."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.200"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866363"},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the 38th IEEE Symposium on Security and Privacy (SP). IEEE, 463--482","author":"Delignat-Lavaud A.","unstructured":"A. Delignat-Lavaud , C. Fournet , M. Kohlweiss , J. Protzenko , A. Rastogi , N. Swamy , S. Zanella-Beguelin , K. Bhargavan , J. Pan , and J. K. Zinzindohoue . 2017. Implementing and Proving the TLS 1.3 Record Layer . In Proceedings of the 38th IEEE Symposium on Security and Privacy (SP). IEEE, 463--482 . A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, J. Protzenko, A. Rastogi, N. Swamy, S. Zanella-Beguelin, K. Bhargavan, J. Pan, and J. K. Zinzindohoue. 2017. Implementing and Proving the TLS 1.3 Record Layer. In Proceedings of the 38th IEEE Symposium on Security and Privacy (SP). IEEE, 463--482."},{"key":"e_1_3_2_2_18_1","volume-title":"Giorgia Azzurra Marson, and Kenneth G. Paterson","author":"Fischlin Marc","year":"2015","unstructured":"Marc Fischlin , Felix G\u00fcnther , Giorgia Azzurra Marson, and Kenneth G. Paterson . 2015 . Data Is a Stream : Security of Stream-Based Channels. In Advances in Cryptology -- CRYPTO 2015. Springer Berlin Heidelberg , 545--564. Marc Fischlin, Felix G\u00fcnther, Giorgia Azzurra Marson, and Kenneth G. Paterson. 2015. Data Is a Stream: Security of Stream-Based Channels. In Advances in Cryptology -- CRYPTO 2015. Springer Berlin Heidelberg, 545--564."},{"key":"e_1_3_2_2_19_1","volume-title":"Giorgia Azzurra Marson, and Kenneth G. Paterson","author":"Fischlin Marc","year":"2017","unstructured":"Marc Fischlin , Felix G\u00fcnther , Giorgia Azzurra Marson, and Kenneth G. Paterson . 2017 . Data Is a Stream : Security of Stream-Based Channels. Cryptology ePrint Archive, Report 2017\/1191. https:\/\/eprint.iacr.org\/2017\/1191. Marc Fischlin, Felix G\u00fcnther, Giorgia Azzurra Marson, and Kenneth G. Paterson. 2017. Data Is a Stream: Security of Stream-Based Channels. Cryptology ePrint Archive, Report 2017\/1191. https:\/\/eprint.iacr.org\/2017\/1191."},{"key":"e_1_3_2_2_20_1","volume-title":"d.}. QUIC, a multiplexed stream transport over UDP. https:\/\/www.chromium.org\/quic, accessed","year":"2018","unstructured":"Google. {n. d.}. QUIC, a multiplexed stream transport over UDP. https:\/\/www.chromium.org\/quic, accessed 13 Feb 2018 . Google. {n. d.}. QUIC, a multiplexed stream transport over UDP. https:\/\/www.chromium.org\/quic, accessed 13 Feb 2018."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_2"},{"key":"e_1_3_2_2_22_1","unstructured":"S. Kent and K. Seo. 2005. Security Architecture for the Internet Protocol. RFC 4301. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc4301.txt http:\/\/www.rfc-editor.org\/rfc\/rfc4301.txt.  S. Kent and K. Seo. 2005. Security Architecture for the Internet Protocol. RFC 4301. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc4301.txt http:\/\/www.rfc-editor.org\/rfc\/rfc4301.txt."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881456"},{"key":"e_1_3_2_2_24_1","unstructured":"D. McGrew. 2008. An Interface and Algorithms for Authenticated Encryption. RFC 5116. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc5116.txt http:\/\/www.rfc-editor.org\/rfc\/rfc5116.txt.  D. McGrew. 2008. An Interface and Algorithms for Authenticated Encryption. RFC 5116. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc5116.txt http:\/\/www.rfc-editor.org\/rfc\/rfc5116.txt."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_15"},{"key":"e_1_3_2_2_26_1","volume-title":"Plaintext-Recovery Attacks Against Datagram TLS. In 19th Annual Network and Distributed System Security Symposium, NDSS.","author":"Kenneth","unstructured":"Kenneth G. Paterson and Nadhem J. AlFardan. 2012 . Plaintext-Recovery Attacks Against Datagram TLS. In 19th Annual Network and Distributed System Security Symposium, NDSS. Kenneth G. Paterson and Nadhem J. AlFardan. 2012. Plaintext-Recovery Attacks Against Datagram TLS. In 19th Annual Network and Distributed System Security Symposium, NDSS."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_20"},{"key":"e_1_3_2_2_29_1","unstructured":"Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. Internet-Draft draft-ietf-tls-tls13--23. IETF Secretariat. http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-tls-tls13--23.txt https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13--23.  Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. Internet-Draft draft-ietf-tls-tls13--23. IETF Secretariat. http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-tls-tls13--23.txt https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13--23."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"E. Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. RFC Editor.  E. Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. RFC Editor.","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_2_31_1","unstructured":"E. Rescorla H. Tschofenig and N. Modadugu. 2017. The Datagram Transport Layer Security (DTLS) Protocol Version 1.3. Internet-Draft draft-ietf-tls-dtls13--22. IETF Secretariat. http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-tls-dtls13--22.txt https:\/\/tools.ietf.org\/html\/draft-ietf-tls-dtls13--22.  E. Rescorla H. Tschofenig and N. Modadugu. 2017. The Datagram Transport Layer Security (DTLS) Protocol Version 1.3. Internet-Draft draft-ietf-tls-dtls13--22. IETF Secretariat. http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-tls-dtls13--22.txt https:\/\/tools.ietf.org\/html\/draft-ietf-tls-dtls13--22."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586125"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.23"},{"key":"e_1_3_2_2_34_1","volume-title":"Presented as part of the 7th USENIX Workshop on Offensive Technologies. USENIX.","author":"Smyth Ben","unstructured":"Ben Smyth and Alfredo Pironti . 2013. Truncating TLS Connections to Violate Beliefs in Web Applications . In Presented as part of the 7th USENIX Workshop on Offensive Technologies. USENIX. Ben Smyth and Alfredo Pironti. 2013. Truncating TLS Connections to Violate Beliefs in Web Applications. In Presented as part of the 7th USENIX Workshop on Offensive Technologies. USENIX."},{"key":"e_1_3_2_2_35_1","volume-title":"IPSEC, WTLS... In Advances in Cryptology - EUROCRYPT","author":"Vaudenay Serge","year":"2002","unstructured":"Serge Vaudenay . 2002. Security Flaws Induced by CBC Padding - Applications to SSL , IPSEC, WTLS... In Advances in Cryptology - EUROCRYPT 2002 . Springer Berlin Heidelberg , 534--545. Serge Vaudenay. 2002. Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS... In Advances in Cryptology - EUROCRYPT 2002. Springer Berlin Heidelberg, 534--545."},{"key":"e_1_3_2_2_36_1","unstructured":"T. Ylonen and C. Lonvick. 2006. The Secure Shell (SSH) Protocol Architecture. RFC 4251. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc4251.txt http:\/\/www.rfc-editor.org\/rfc\/rfc4251.txt.  T. Ylonen and C. Lonvick. 2006. The Secure Shell (SSH) Protocol Architecture. RFC 4251. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc4251.txt http:\/\/www.rfc-editor.org\/rfc\/rfc4251.txt."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243789","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243789","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:18Z","timestamp":1750212498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243789"}},"subtitle":["The TLS 1.3 Record Layer without Elision"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":35,"alternative-id":["10.1145\/3243734.3243789","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243789","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}