Crypto, Security, Privacy

Crypto, Security, Privacy

Cryptography, Security, Privacy
Crypto, Security, Privacy
(your) information wants to be free – obamacare edition - http://benlog.com/2015...
Crypto, Security, Privacy
managing photos and videos - http://benlog.com/2015...
Pierotaglia
Researchers released a script to decrypt and extract LastPass Master Password http://www.sectechno.com/researc...
Darshik
6 easy ways to ensure your online privacy and keeping away eavesdroppers http://www.techstagram.com/2013...
Crypto, Security, Privacy
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, by Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Cryptography with One-Way Communication, by Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Adaptively Secure Fully Homomorphic Signatures Based on Lattices, by Xavier Boyen and Xiong Fan and Elaine Shi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
The Security of the Hanser-Slamanig Signature Scheme Revisited, by Yanbin Pan - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model, by Vanishree Rao - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Finding shortest lattice vectors faster using quantum search, by Thijs Laarhoven and Michele Mosca and Joop van de Pol - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Two-factor authentication for the Bitcoin protocol, by Christopher Mann and Daniel Loebenberger - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
High Parallel Complexity Graphs and Memory-Hard Functions, by Jo\"el Alwen and Vladimir Serbinenko - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Practical UC security with a Global Random Oracle, by Ran Canetti and Abhishek Jain and Alessandra Scafuro - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Decentralized Public Key Infrastructure with Identity Retention, by Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Primary-Secondary-Resolver Membership Proof Systems, by Moni Naor and Asaf Ziv - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Robust Secret Sharing Schemes Against Local Adversaries, by Allison Bishop Lewko and Valerio Pastro - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge, by Esha Ghosh and Olga Ohrimenko and Roberto Tamassia - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Denial of Service Attack against Fair Computations using Bitcoin Deposits, by Jethro Beekman - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Cryptanalysis of the Multilinear Map over the Integers, by Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehl\'e - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Low-Cost Concurrent Error Detection for GCM and CCM, by Xiaofei Guo and Ramesh Karri - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A technological approach to better living, for D.C. and beyond - https://freedom-to-tinker.com/blog...
Crypto, Security, Privacy
A 128-bit Block Cipher Based on Three Group Arithmetics, by Shenghui Su and Shuwang Lv - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
How Secure is TextSecure?, by Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Graph-Induced Multilinear Maps from Lattices, by Craig Gentry and Sergey Gorbunov and Shai Halevi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Verifiable computation using multiple provers, by Andrew J. Blumberg and Justin Thaler and Victor Vu and Michael Walfish - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Overview of the Candidates for the Password Hashing Competition -- And their Resistance against Garbage-Collector Attacks, by Stefan Lucks and Jakob Wenzel - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
BRUTUS: Identifying Cryptanalytic Weaknesses in CAESAR First Round Candidates, by Markku-Juhani O. Saarinen - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Adaptively Secure UC Constant Round Multi-Party Computation, by Ivan Damgård and Antigoni Polychroniadou and Vanishree Rao - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack, by Pei Luo and Yunsi Fei - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation, by David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel-Cătălin Roşu and Michael Steiner - http://eprint.iacr.org/2014...
Other ways to read this feed:Feed readerFacebook