{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:52:39Z","timestamp":1769914359994,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Austrian Science Fund (FWF)","award":["10.55776\/F8507-N"],"award-info":[{"award-number":["10.55776\/F8507-N"]}]},{"name":"CyberSecurity Research Flanders","award":["VR20192203"],"award-info":[{"award-number":["VR20192203"]}]},{"name":"Research Council KU Leuven C1","award":["C16\/15\/058"],"award-info":[{"award-number":["C16\/15\/058"]}]},{"name":"FWO","award":["G.0835.16"],"award-info":[{"award-number":["G.0835.16"]}]},{"name":"European Union","award":["101087529"],"award-info":[{"award-number":["101087529"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3637673","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"1082-1098","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Skye: An Expanding PRF based Fast KDF and its Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0843-4885","authenticated-orcid":false,"given":"Amit Singh","family":"Bhati","sequence":"first","affiliation":[{"name":"COSIC, KU Leuven, Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5058-2571","authenticated-orcid":false,"given":"Anton\u00edn","family":"Dufka","sequence":"additional","affiliation":[{"name":"Masaryk University, Brno, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0964-8711","authenticated-orcid":false,"given":"Elena","family":"Andreeva","sequence":"additional","affiliation":[{"name":"Technical University of Vienna, Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3284-7076","authenticated-orcid":false,"given":"Arnab","family":"Roy","sequence":"additional","affiliation":[{"name":"University of Innsbruck, Innsbruck, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2005-9651","authenticated-orcid":false,"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[{"name":"COSIC, KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_5"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2021.i3.1-35"},{"key":"e_1_3_2_1_3_1","volume-title":"Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function. Cryptology ePrint Archive","author":"Andreeva Elena","year":"2022","unstructured":"Elena Andreeva, Benoit Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, and Arnab Roy. 2022. Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34621-8_6"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Richard Barnes Benjamin Beurdouche Raphael Robert Jon Millican Emad Omara and Katriel Cohn-Gordon. 2022. The Messaging Layer Security (MLS) Protocol. (2022). Internet-Draft https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-mls-protocol-17.","DOI":"10.17487\/RFC9420"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"e_1_3_2_1_8_1","volume-title":"Algorithmic Number Theory","author":"Boneh Dan","unstructured":"Dan Boneh. 1998. The Decision Diffie-Hellman problem. In Algorithmic Number Theory. Springer, 48--63."},{"key":"e_1_3_2_1_9_1","volume-title":"Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake. In 25th IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC","author":"Brendel Jacqueline","year":"2022","unstructured":"Jacqueline Brendel, Rune Fiedler, Felix G\u00fcnther, Christian Janson, and Douglas Stebila. 2022. Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake. In 25th IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2022). Springer, 3--34."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_33"},{"key":"e_1_3_2_1_12_1","volume-title":"Key Derivation Function: The SCKDF Scheme. In IFIP International Information Security Conference. Springer, 125--138","author":"Chuah Chai Wen","year":"2013","unstructured":"Chai Wen Chuah, Edward Dawson, and Leonie Simpson. 2013. Key Derivation Function: The SCKDF Scheme. In IFIP International Information Security Conference. Springer, 125--138."},{"key":"e_1_3_2_1_13_1","volume-title":"A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers. IACR Transactions on Symmetric Cryptology","author":"Cid Carlos","year":"2017","unstructured":"Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, and Ling Song. 2017. A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers. IACR Transactions on Symmetric Cryptology (2017), 73--107."},{"key":"e_1_3_2_1_14_1","volume-title":"Two-sources randomness extractors for elliptic curves. arXiv preprint arXiv:1404.2226","author":"Ciss Abdoul Aziz","year":"2014","unstructured":"Abdoul Aziz Ciss. 2014. Two-sources randomness extractors for elliptic curves. arXiv preprint arXiv:1404.2226 (2014)."},{"key":"e_1_3_2_1_15_1","volume-title":"Two-Source Randomness Extractors for Elliptic Curves for Authenticated Key Exchange. In International Conference on Codes, Cryptology, and Information Security. Springer, 85--95","author":"Ciss Abdoul Aziz","year":"2017","unstructured":"Abdoul Aziz Ciss and Djiby Sow. 2017. Two-Source Randomness Extractors for Elliptic Curves for Authenticated Key Exchange. In International Conference on Codes, Cryptology, and Information Security. Springer, 85--95."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.27"},{"key":"e_1_3_2_1_17_1","article-title":"Cryptanalysis of AES-PRF and Its Dual","volume":"2018","author":"Derbez Patrick","year":"2018","unstructured":"Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, and Meiqin Wang. 2018. Cryptanalysis of AES-PRF and Its Dual. IACR Transactions on Symmetric Cryptology 2018, 2 (2018).","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"e_1_3_2_1_18_1","volume-title":"Approximation, randomization, and combinatorial optimization. Algorithms and techniques","author":"Dodis Yevgeniy","unstructured":"Yevgeniy Dodis, Ariel Elbaz, Roberto Oliveira, and Ran Raz. 2004. Improved Randomness Extraction from Two Independent Sources. In Approximation, randomization, and combinatorial optimization. Algorithms and techniques. Springer, 334--344."},{"key":"e_1_3_2_1_19_1","unstructured":"Signal Foundation. 2023. Signal Protocol software libraries. (2023). Github [accessed on 05\/02\/2023] https:\/\/github.com\/signalapp\/."},{"key":"e_1_3_2_1_20_1","volume-title":"33rd International Colloquium, ICALP (LNCS","volume":"251","author":"Fouque Pierre-Alain","year":"2006","unstructured":"Pierre-Alain Fouque, David Pointcheval, Jacques Stern, and S\u00e9bastien Zimmer. 2006. Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes. In Automata, Languages and Programming, 33rd International Colloquium, ICALP (LNCS, Vol. 4052). Springer, 240--251."},{"key":"e_1_3_2_1_21_1","volume-title":"A Comparison of Signalling Alphabets. The Bell system technical journal 31, 3","author":"Gilbert Edgar Nelson","year":"1952","unstructured":"Edgar Nelson Gilbert. 1952. A Comparison of Signalling Alphabets. The Bell system technical journal 31, 3 (1952), 504--522."},{"key":"e_1_3_2_1_22_1","unstructured":"Markus Grassl. 2007. Bounds on the minimum distance of linear codes and quantum codes. Online available at http:\/\/www.codetables.de. [accessed on 25\/06\/2021]."},{"key":"e_1_3_2_1_23_1","unstructured":"Meta Platforms Inc (Facebook Inc). 2016. Messenger secret conversations: Technical whitepaper. (2016). https:\/\/about.fb.com\/wp-content\/uploads\/2016\/07\/messenger-secret-conversations-technical-whitepaper.pdf."},{"key":"e_1_3_2_1_24_1","unstructured":"J\u00e9r\u00e9my Jean Ivica Nikoli\u0107 Thomas Peyrin and Yannick Seurin. October 2016. Submission to CAESAR: Deoxys v1.41. http:\/\/competitions.cr.yp.to\/round3\/deoxysv141.pdf."},{"key":"e_1_3_2_1_25_1","volume-title":"Cryptographic Extraction and Key Derivation: The HKDF Scheme. In Annual Cryptology Conference (CRYPTO). Springer, 631--648","author":"Krawczyk Hugo","year":"2010","unstructured":"Hugo Krawczyk. 2010. Cryptographic Extraction and Key Derivation: The HKDF Scheme. In Annual Cryptology Conference (CRYPTO). Springer, 631--648."},{"key":"e_1_3_2_1_26_1","volume-title":"HMAC: Keyed-hashing for Message Authentication.","author":"Krawczyk Hugo","year":"1997","unstructured":"Hugo Krawczyk, Mihir Bellare, and Ran Canetti. 1997. HMAC: Keyed-hashing for Message Authentication. (1997). RFC 2104."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa028"},{"key":"e_1_3_2_1_28_1","unstructured":"J Lund. 2018. Signal partners with Microsoft to bring end-to-end encryption to Skype. (2018). https:\/\/signal.org\/blog\/skype-partnership\/."},{"key":"e_1_3_2_1_29_1","volume-title":"What's the Curve25519 clamping all about?","author":"Madden Neil","year":"2020","unstructured":"Neil Madden. 2020. What's the Curve25519 clamping all about? (2020). https:\/\/neilmadden.blog\/2020\/05\/28\/whats-the-curve25519-clamping-all-about\/."},{"key":"e_1_3_2_1_30_1","unstructured":"Moxie Marlinspike. 2016. Open whisper systems partners with Google on end-to-end encryption for Allo. (2016). https:\/\/signal.org\/blog\/allo\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Moxie Marlinspike. 2016. WhatsApp's Signal Protocol integration is now complete. (2016). https:\/\/signal.org\/blog\/whatsapp-complete\/."},{"key":"e_1_3_2_1_32_1","unstructured":"Moxie Marlinspike and Trevor Perrin. 2016. The Double Ratchet Algorithm. (2016). https:\/\/whispersystems.org\/docs\/specifications\/doubleratchet\/doubleratchet.pdf."},{"key":"e_1_3_2_1_33_1","volume-title":"The X3DH Key Agreement Protocol. Open Whisper Systems","author":"Marlinspike Moxie","year":"2016","unstructured":"Moxie Marlinspike and Trevor Perrin. 2016. The X3DH Key Agreement Protocol. Open Whisper Systems (2016). https:\/\/signal.org\/docs\/specifications\/x3dh\/x3dh.pdf."},{"key":"e_1_3_2_1_34_1","volume-title":"USA","author":"Maurer Ueli","year":"2007","unstructured":"Ueli Maurer, Krzysztof Pietrzak, and Renato Renner. 2007. Indistinguishability Amplification. In Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings 27. Springer, 130--149."},{"key":"e_1_3_2_1_35_1","volume-title":"Optimal PRFs from Blockcipher Designs. IACR Transactions on Symmetric Cryptology","author":"Mennink Bart","year":"2017","unstructured":"Bart Mennink and Samuel Neves. 2017. Optimal PRFs from Blockcipher Designs. IACR Transactions on Symmetric Cryptology (2017), 228--252."},{"key":"e_1_3_2_1_36_1","unstructured":"Trevor Perrin. 2016. The Noise Protocol Framework. (2016). noiseprotocol.org."},{"key":"e_1_3_2_1_37_1","unstructured":"Andrea Piana Pedro Pombeiro Corey Petty Oskar Thor\u00e9n and Dean Eigenmann. 2020. Specifications for Status clients - 5\/SECURE-TRANSPORT. (2020). https:\/\/specs.status.im\/spec\/5."},{"key":"e_1_3_2_1_38_1","volume-title":"Evaluation of Some Blockcipher Modes of Operation. Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan","author":"Rogaway Phillip","year":"2011","unstructured":"Phillip Rogaway. 2011. Evaluation of Some Blockcipher Modes of Operation. Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan (2011)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA50397.2020.00020"},{"key":"e_1_3_2_1_40_1","volume-title":"Multi-sources Randomness Extraction over Finite Fields and Elliptic Curve. arXiv preprint arXiv:1502.00433","author":"Tchapgnouo Hortense Boudjou","year":"2015","unstructured":"Hortense Boudjou Tchapgnouo and Abdoul Aziz Ciss. 2015. Multi-sources Randomness Extraction over Finite Fields and Elliptic Curve. arXiv preprint arXiv:1502.00433 (2015)."},{"key":"e_1_3_2_1_41_1","volume-title":"Djiby Sow, and Dina Ta\u00efw\u00e9 Kolyang.","author":"Tchapgnouo Hortense Boudjou","year":"2017","unstructured":"Hortense Boudjou Tchapgnouo, Abdoul Aziz Ciss, Djiby Sow, and Dina Ta\u00efw\u00e9 Kolyang. 2017. Two-sources randomness extractors in finite fields and in elliptic curves. African Journal of Research in Computer Science and Applied Mathematics 24 (2017)."},{"key":"e_1_3_2_1_42_1","first-page":"739","article-title":"Estimate of the number of signals in error correcting codes","volume":"117","author":"Varshamov Rom Rubenovich","year":"1957","unstructured":"Rom Rubenovich Varshamov. 1957. Estimate of the number of signals in error correcting codes. Docklady Akad. Nauk, SSSR 117 (1957), 739--741.","journal-title":"Docklady Akad. Nauk, SSSR"},{"key":"e_1_3_2_1_43_1","volume-title":"New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect. IACR Transactions on Symmetric Cryptology","author":"Zhao Boxin","year":"2019","unstructured":"Boxin Zhao, Xiaoyang Dong, and Keting Jia. 2019. New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect. IACR Transactions on Symmetric Cryptology (2019), 121--151."}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","location":"Singapore Singapore","acronym":"ASIA CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3637673","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:06Z","timestamp":1750290246000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3637673"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":42,"alternative-id":["10.1145\/3634737.3637673","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3637673","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}