Submit two items to the submission website (see link in the navigation bar at the top of the page):
The paper talks about game-based cryptographic proofs, which show that the Everest TLS implementation implements an idealized secure channel, assuming the underlying cryptography is correct. What cryptographic primitives do the authors assume correct? How do they encode the assumption that these primitives are correct?
Questions or comments regarding 6.826? Contact us on Piazza or send e-mail to the 6.826 staff at 6826-staff@lists.csail.mit.edu.