Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
Crypto, Security, Privacy

Crypto, Security, Privacy

Cryptography, Security, Privacy
Pierotaglia
Researchers released a script to decrypt and extract LastPass Master Password http://www.sectechno.com/researc...
imabonehead
What Do I Do if I Use Two-Factor Authentication and Lose My Phone? - http://lifehacker.com/what-do...
What Do I Do if I Use Two-Factor Authentication and Lose My Phone?
"Dear Lifehacker, I've heard that I need to enable two-factor authentication on my phone, but it seems risky. What happens if I lose my phone? Will I lose my entire account? And if I change phones, how do I move the authenticator to a new device?" - imabonehead from Bookmarklet
Darshik
6 easy ways to ensure your online privacy and keeping away eavesdroppers http://www.techstagram.com/2013...
Crypto, Security, Privacy
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, by Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Cryptography with One-Way Communication, by Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Adaptively Secure Fully Homomorphic Signatures Based on Lattices, by Xavier Boyen and Xiong Fan and Elaine Shi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
The Security of the Hanser-Slamanig Signature Scheme Revisited, by Yanbin Pan - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model, by Vanishree Rao - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Finding shortest lattice vectors faster using quantum search, by Thijs Laarhoven and Michele Mosca and Joop van de Pol - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Two-factor authentication for the Bitcoin protocol, by Christopher Mann and Daniel Loebenberger - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
High Parallel Complexity Graphs and Memory-Hard Functions, by Jo\"el Alwen and Vladimir Serbinenko - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Practical UC security with a Global Random Oracle, by Ran Canetti and Abhishek Jain and Alessandra Scafuro - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Decentralized Public Key Infrastructure with Identity Retention, by Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Primary-Secondary-Resolver Membership Proof Systems, by Moni Naor and Asaf Ziv - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Robust Secret Sharing Schemes Against Local Adversaries, by Allison Bishop Lewko and Valerio Pastro - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge, by Esha Ghosh and Olga Ohrimenko and Roberto Tamassia - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Denial of Service Attack against Fair Computations using Bitcoin Deposits, by Jethro Beekman - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Cryptanalysis of the Multilinear Map over the Integers, by Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehl\'e - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Low-Cost Concurrent Error Detection for GCM and CCM, by Xiaofei Guo and Ramesh Karri - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A technological approach to better living, for D.C. and beyond - https://freedom-to-tinker.com/blog...
Crypto, Security, Privacy
A 128-bit Block Cipher Based on Three Group Arithmetics, by Shenghui Su and Shuwang Lv - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
How Secure is TextSecure?, by Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion, by Kerry A. McKay and Poorvi L. Vora - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Verifiable computation using multiple provers, by Andrew J. Blumberg and Justin Thaler and Victor Vu and Michael Walfish - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds, by Dana Dachman-Soled and Jonathan Katz and Vanishree Rao - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Efficiently Making Secure Two-Party Computation Fair, by Handan Kılınç and Alptekin Küpçü - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Accelerating Bliss: the geometry of ternary polynomials, by Léo Ducas - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Near Optimal Rate Homomorphic Encryption for Branching Programs, by Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Watch your Constants: Malicious Streebog, by Riham AlTawy and Amr M. Youssef - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability, by Essam Ghadafi - http://eprint.iacr.org/2014...
Other ways to read this feed:Feed readerFacebook