Britta Hale

Orcid: 0000-0003-1131-2109

According to our database1, Britta Hale authored at least 38 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Terminology for Post-Quantum Traditional Hybrid Schemes.
RFC, June, 2025

Key Establishment in the Space Environment.
CoRR, March, 2025

Blockchain-Based Authenticated Stego-Channels and Application to Ethereum.
IEEE Trans. Dependable Secur. Comput., 2025

The Future of Digital Twin Research and Development.
J. Comput. Inf. Sci. Eng., 2025

Making Post Quantum Key Exchange Efficient: An Implementation with the MLS Protocol.
IACR Cryptol. ePrint Arch., 2025

Introduction to the Minitrack on Applied Security Through Cyber Innovation and Implementation.
Proceedings of the 58th Hawaii International Conference on System Sciences, 2025

2024
Cryptography is Rocket Science: Analysis of BPSec.
IACR Commun. Cryptol., 2024

Introduction to the Minitrack on Critical Infrastructure and Cyber Systems.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

DRACO: Production Network Deployment and Evaluation of Deceptive Defense As-a-Service.
Proceedings of the IEEE International Conference on Big Data, 2024

2023
Zero-Trust for the System Design Lifecycle.
J. Comput. Inf. Sci. Eng., December, 2023

Guardianship in Group Key Exchange for Limited Environments.
IACR Cryptol. ePrint Arch., 2023

Authenticated Continuous Key Agreement: Active MitM Detection and Prevention.
IACR Cryptol. ePrint Arch., 2023

A Note on Hybrid Signature Schemes.
IACR Cryptol. ePrint Arch., 2023

Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Utilizing the Messaging Layer Security Protocol in a Lossy Communications Aerial Swarm.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Model Based Resilience Engineering for Design and Assessment of Mission Critical Systems Containing Artificial Intelligence Components.
Proceedings of the Artificial Intelligence and Cybersecurity: Theory and Applications, 2023

2022
On End-to-End Encryption.
IACR Cryptol. ePrint Arch., 2022

Securing Software Updates under Receiver Radio Frequency Geolocation Risk.
Proceedings of the IEEE Military Communications Conference, 2022

Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Blockchain-based Authenticated Stego-Channels: A Security Framework and Construction.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
System Analysis of Counter-Unmanned Aerial Systems Kill Chain in an Operational Environment.
Syst., 2021

A Zero Trust Hybrid Security and Safety Risk Analysis Method.
J. Comput. Inf. Sci. Eng., 2021

The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter.
Proceedings of the 30th USENIX Security Symposium, 2021

Strengthening SDN Security: Protocol Dialecting and Downgrade Attacks.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Secure Messaging Authentication against Active Man-in-the-Middle Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging.
IACR Cryptol. ePrint Arch., 2020

2019
Computationally Modeling User-Mediated Authentication Protocols.
IACR Cryptol. ePrint Arch., 2019

Revisiting Post-Compromise Security Guarantees in Group Messaging.
IACR Cryptol. ePrint Arch., 2019

2018
User-Mediated Authentication Protocols and Unforgeability in Key Collision.
Proceedings of the Provable Security, 2018

2017
Secure Channels and Termination: The Last Word on TLS.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017

0-RTT Key Exchange with Full Forward Secrecy.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Simple Security Definitions for and Constructions of 0-RTT Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

2015
Speeding: On Low-Latency Key Exchange.
IACR Cryptol. ePrint Arch., 2015

CARIBE: Adapting Traditional IBE for the Modern Key-Covetous Appetite.
IACR Cryptol. ePrint Arch., 2015

2014
Computationally Analyzing the ISO 9798-2.4 Authentication Protocol.
Proceedings of the Security Standardisation Research - First International Conference, 2014


  Loading...