Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
Crypto, Security, Privacy

Crypto, Security, Privacy

Cryptography, Security, Privacy
imabonehead
Mozilla accidentally left email addresses, passwords of 97k Bugzilla users out in the open | PCWorld - http://www.pcworld.com/article...
Mozilla accidentally left email addresses, passwords of 97k Bugzilla users out in the open | PCWorld
"Email addresses and encrypted passwords of around 97,000 users who tested early builds of the Bugzilla bug tracking software were left exposed for three months following a server migration. This is the second accidental data disclosure incident reported this month that affects one of the projects supported by the Mozilla Foundation." - imabonehead from Bookmarklet
Oops. - Kevin Johnson from Android
imabonehead
"The past few weeks have seen new releases of FreeOTP on both of our supported platforms." - imabonehead from Bookmarklet
Crypto, Security, Privacy
Power & Accountability - http://benlog.com/2014...
imabonehead
New “TCP Stealth” tool aims to help sysadmins block spies from exploiting their systems — Tech News and Analysis - http://gigaom.com/2014...
New “TCP Stealth” tool aims to help sysadmins block spies from exploiting their systems — Tech News and Analysis
"Systems administrators who aren’t down with spies commandeering their servers might want to pay attention to this one: A Friday article in German security publication Heise provided technical detail on a GCHQ program called HACIENDA, which the British spy agency apparently uses to port-scan entire countries, and the authors have come up with an Internet Engineering Task Force draft for a new technique to counter this program." - imabonehead from Bookmarklet
Crypto, Security, Privacy
Simple AEAD Hardware Interface (S{\AE}HI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor, by Markku-Juhani O. Saarinen - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
How to manipulate curve standards: a white paper for the black hat, by Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas H\"ulsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Security Analysis of Multilinear Maps over the Integers, by Hyung Tae Lee and Jae Hong Seo - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A new public key system based on Polynomials over finite fields GF(2), by Gurgen Khachatrian - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings, by Rafael Pass and Karn Seth and Sidharth Telang - http://eprint.iacr.org/2013...
Crypto, Security, Privacy
Vernam Two, by Dan P. Milleville - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
On the Optimality of Differential Fault Analyses on CLEFIA, by Juliane Krämer and Anke Stüber and Ágnes Kiss - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Toward Robust Hidden Volumes using Write-Only Oblivious RAM, by Erik-Oliver Blass and Travis Mayberry and Guevara Noubir and Kaan Onarlioglu - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
The Exact PRF-Security of NMAC and HMAC, by Peter Gazi and Krzysztof Pietrzak and Michal Rybár - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Deja Q: Using Dual Systems to Revisit q-Type Assumptions, by Melissa Chase and Sarah Meiklejohn - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Reducing Communication Overhead of the Subset Difference Scheme, by Sanjay Bhattacherjee and Palash Sarkar - http://eprint.iacr.org/2014...
imabonehead
"The idea behind CV dazzle is simple. Facial recognition algorithms look for certain patterns when they analyze images: patterns of light and dark in the cheekbones, or the way color is distributed on the nose bridge—a baseline amount of symmetry. These hallmarks all betray the uniqueness of a human visage. If you obstruct them, the algorithm can’t separate a face from any other swath of pixels." - imabonehead from Bookmarklet
Crypto, Security, Privacy
3-sentence summary of what’s happening in Israel and Gaza - http://www.scottaaronson.com/blog...
Crypto, Security, Privacy
Publicly Auditable Secure Multi-Party Computation, by Carsten Baum and Ivan Damgård and Claudio Orlandi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes, by Daniel Augot and Matthieu Finiasz - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation, by Hiroaki Anada and Seiko Arita and Kouichi Sakurai - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC, by Masao KASAHARA - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Fast Lattice Point Enumeration with Minimal Overhead, by Daniele Micciancio and Michael Walter - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
“How Might Quantum Information Transform Our Future?” - http://www.scottaaronson.com/blog...
Crypto, Security, Privacy
Exact Smooth Projective Hash Function based on LWE, by Olivier Blazy and Céline Chevalier and Léo Ducas and Jiaxin Pan - http://eprint.iacr.org/2013...
Crypto, Security, Privacy
Kangaroos in Side-Channel Attacks, by Tanja Lange and Christine van Vredendaal and Marnix Wakker - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Sealing the Leak on Classical NTRU Signatures, by Carlos Aguilar Melchor and Xavier Boyen and Jean-Christophe Deneuville and Philippe Gaborit - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency, by Kwangsu Lee and Dong Hoon Lee - http://eprint.iacr.org/2013...
Crypto, Security, Privacy
Calculating Cryptographic Degree of an S-Box, by Prasanna Raghaw Mishra - http://eprint.iacr.org/2014...
imabonehead
Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA | Enterprise | WIRED - http://www.wired.com/2014...
Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA | Enterprise | WIRED
"When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA’s prying eyes. It’s called Tails. And naturally, nobody knows exactly who created it." - imabonehead from Bookmarklet
Che sia *per caso* questo?https://tails.boum.org - Luca Perencin (No_CQRT) from Android
Crypto, Security, Privacy
A Security Definition for Multi Secret Sharing and a Scheme Based on LWE, by Massoud Hadian Dehkordi and Reza Ghasemi - http://eprint.iacr.org/2014...
Other ways to read this feed:Feed readerFacebook