Publications
If you published a paper studying some aspect of EDHOC that is not listed below, reach out to lake-chairs@ietf.org.
Lopez Perez, E., Watteyne, T., Marin-Lopez, R., Onete C., Papon C., Vučinić, M. Pre-Shared Key Authentication with EDHOC: The Security-Perfromance Tradeoff. IEEE Access, 2025. https://ieeexplore.ieee.org/abstract/document/11247913
Song Y., Fedrecheski G., Vučinić M., Watteyne T. AuRA: Remote Attestation over EDHOC for Constrained Internet-of-Things Use Cases. IEEE Symposium on Computers and Communications (ISCC), 2025. https://hal.science/hal-05114120v1/document
Lopez Perez, E., Selander, G., Mattsson, J.P., Watteyne, T. and Vučinić, M. EDHOC is a new security handshake standard: An overview of security analysis. IEEE Computer. 2024. https://inria.hal.science/hal-04635881v1/document
Jacomme, C., Klein, E., Kremer, S., Racouchot, M., A comprehensive, formal and automated analysis of the EDHOC protocol. USENIX Security ’23 - 32nd USENIX Security Symposium, Aug 2023, Anaheim, CA, United States. https://hal.inria.fr/hal-03810102/document
Vučinić, M., Selander, G., Mattsson, J., and Watteyne, T., Lightweight Authenticated Key Exchange with EDHOC. IEEE Computer. 2022.
Lightweight Authenticated Key Exchange with EDHOC .Norrman, K., Sundadarajan, V., Bruni, Alessandro., Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices. In Proceedings of the 18th International Conference on Security and Cryptography (2021), ISBN 978-989-758-524-1, ISSN 2184-7711, pages 210-221.
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices.Hristozov, S., Huber, M., Xu, L., Fietz, J., Liess, M. and Sigl, G., 2021, April. The Cost of OSCORE and EDHOC for Constrained Devices. In Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy (pp. 245-250). https://dl.acm.org/doi/abs/10.1145/3422337.3447834.
Bruni, A., Sahl Jørgensen, T., Grønbech Petersen, T. and Schürmann, C., 2018, November. Formal verification of ephemeral Diffie-Hellman over COSE (EDHOC). In International Conference on Research in Security Standardisation (pp. 21-36). Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-030-04762-7_2 .