Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
Crypto, Security, Privacy

Crypto, Security, Privacy

Cryptography, Security, Privacy
Darshik
6 easy ways to ensure your online privacy and keeping away eavesdroppers http://www.techstagram.com/2013...
Crypto, Security, Privacy
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, by Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Cryptography with One-Way Communication, by Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Adaptively Secure Fully Homomorphic Signatures Based on Lattices, by Xavier Boyen and Xiong Fan and Elaine Shi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
The Security of the Hanser-Slamanig Signature Scheme Revisited, by Yanbin Pan - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model, by Vanishree Rao - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Finding shortest lattice vectors faster using quantum search, by Thijs Laarhoven and Michele Mosca and Joop van de Pol - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Two-factor authentication for the Bitcoin protocol, by Christopher Mann and Daniel Loebenberger - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
High Parallel Complexity Graphs and Memory-Hard Functions, by Jo\"el Alwen and Vladimir Serbinenko - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Practical UC security with a Global Random Oracle, by Ran Canetti and Abhishek Jain and Alessandra Scafuro - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Decentralized Public Key Infrastructure with Identity Retention, by Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Primary-Secondary-Resolver Membership Proof Systems, by Moni Naor and Asaf Ziv - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Robust Secret Sharing Schemes Against Local Adversaries, by Allison Bishop Lewko and Valerio Pastro - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge, by Esha Ghosh and Olga Ohrimenko and Roberto Tamassia - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Denial of Service Attack against Fair Computations using Bitcoin Deposits, by Jethro Beekman - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Cryptanalysis of the Multilinear Map over the Integers, by Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehl\'e - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Low-Cost Concurrent Error Detection for GCM and CCM, by Xiaofei Guo and Ramesh Karri - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A technological approach to better living, for D.C. and beyond - https://freedom-to-tinker.com/blog...
Crypto, Security, Privacy
A 128-bit Block Cipher Based on Three Group Arithmetics, by Shenghui Su and Shuwang Lv - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
How Secure is TextSecure?, by Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
True Random Number Generators Secure in a Changing Environment: Improved Security Bounds, by Maciej Skorski - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks, by Ryotaro Hayashi and Tatsuyuki Matsushita - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Additively Homomorphic UC commitments with Optimal Amortized Overhead, by Ignacio Cascudo and Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings, by Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Distance Lower Bounding, by Xifan Zheng and Reihaneh Safavi-Naini and Hadi Ahmadi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Hardware Implementation of Secure Shamir's Secret Sharing Scheme , by Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots, by İhsan Haluk Akın - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
An algorithm for MD5 single-block collision attack using high-performance computing cluster, by Anton A. Kuznetsov - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints, by Koji Nuida and Naoto Itakura and Kaoru Kurosawa - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Explicit Non-malleable Codes Resistant to Permutations and Perturbations, by Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran - http://eprint.iacr.org/2014...
Other ways to read this feed:Feed readerFacebook