Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
Crypto, Security, Privacy

Crypto, Security, Privacy

Cryptography, Security, Privacy
Crypto, Security, Privacy
(your) information wants to be free – obamacare edition - http://benlog.com/2015...
Crypto, Security, Privacy
managing photos and videos - http://benlog.com/2015...
imabonehead
Entry Point of JPMorgan Data Breach Is Identified - NYTimes.com - http://dealbook.nytimes.com/...
Entry Point of JPMorgan Data Breach Is Identified - NYTimes.com
"Most big banks use a double authentication scheme, known as two-factor authentication, which requires a second one-time password to gain access to a protected system. But JPMorgan’s security team had apparently neglected to upgrade one of its network servers with the dual password scheme, the people briefed on the matter said. That left the bank vulnerable to intrusion." - imabonehead from Bookmarklet
Pierotaglia
Researchers released a script to decrypt and extract LastPass Master Password http://www.sectechno.com/researc...
imabonehead
What Do I Do if I Use Two-Factor Authentication and Lose My Phone? - http://lifehacker.com/what-do...
What Do I Do if I Use Two-Factor Authentication and Lose My Phone?
"Dear Lifehacker, I've heard that I need to enable two-factor authentication on my phone, but it seems risky. What happens if I lose my phone? Will I lose my entire account? And if I change phones, how do I move the authenticator to a new device?" - imabonehead from Bookmarklet
Darshik
6 easy ways to ensure your online privacy and keeping away eavesdroppers http://www.techstagram.com/2013...
Crypto, Security, Privacy
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, by Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Cryptography with One-Way Communication, by Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Adaptively Secure Fully Homomorphic Signatures Based on Lattices, by Xavier Boyen and Xiong Fan and Elaine Shi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
The Security of the Hanser-Slamanig Signature Scheme Revisited, by Yanbin Pan - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model, by Vanishree Rao - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Finding shortest lattice vectors faster using quantum search, by Thijs Laarhoven and Michele Mosca and Joop van de Pol - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Two-factor authentication for the Bitcoin protocol, by Christopher Mann and Daniel Loebenberger - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
High Parallel Complexity Graphs and Memory-Hard Functions, by Jo\"el Alwen and Vladimir Serbinenko - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Practical UC security with a Global Random Oracle, by Ran Canetti and Abhishek Jain and Alessandra Scafuro - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Decentralized Public Key Infrastructure with Identity Retention, by Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Primary-Secondary-Resolver Membership Proof Systems, by Moni Naor and Asaf Ziv - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Robust Secret Sharing Schemes Against Local Adversaries, by Allison Bishop Lewko and Valerio Pastro - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge, by Esha Ghosh and Olga Ohrimenko and Roberto Tamassia - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Denial of Service Attack against Fair Computations using Bitcoin Deposits, by Jethro Beekman - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Cryptanalysis of the Multilinear Map over the Integers, by Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehl\'e - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Low-Cost Concurrent Error Detection for GCM and CCM, by Xiaofei Guo and Ramesh Karri - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A technological approach to better living, for D.C. and beyond - https://freedom-to-tinker.com/blog...
Crypto, Security, Privacy
A 128-bit Block Cipher Based on Three Group Arithmetics, by Shenghui Su and Shuwang Lv - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
How Secure is TextSecure?, by Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Side Channel Power Analysis of an AES-256 Bootloader, by Colin O'Flynn and Zhizhang Chen - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Pseudonymous Secure Computation from Time-Lock Puzzles, by Jonathan Katz and Andrew Miller and Elaine Shi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme, by Eduardo Morais and Ricardo Dahab - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers, by Alhassan Khedr and Glenn Gulak and Vinod Vaikuntanathan - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Operational Signature Schemes, by Michael Backes and Ozgur Dagdelen and Marc Fischlin and Sebastian Gajek and Sebastian Meiser and Dominique Schröder - http://eprint.iacr.org/2014...
Other ways to read this feed:Feed readerFacebook