and Security

Results: 171768



#Item
31

Fraud Proofs: Maximising Light Client Security and Scaling Blockchains with Dishonest Majorities Mustafa Al-Bassam1 , Alberto Sonnino1 , and Vitalik Buterin2 1

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

- Date: 2018-09-24 13:50:14
    32Cryptography / Public-key cryptography / Cryptographic protocols / Identity-based cryptography / ID-based encryption / Functional encryption / Garbled circuit / Encryption / Secure multi-party computation / Attribute-based encryption / RSA / Chosen-ciphertext attack

    Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Zvika Brakerski∗ Alex Lombardi†

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2017-10-01 05:36:24
    33Cryptography / Secret sharing / Public-key cryptography / Secure multi-party computation / Commitment scheme / Cryptographic protocol / Block cipher / Zero-knowledge proof

    Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

    Add to Reading List

    Source URL: zkp.science

    Language: English - Date: 2018-09-15 05:52:51
    34

    1 SecureML: A System for Scalable Privacy-Preserving Machine Learning Payman Mohassel∗ and Yupeng Zhang† Research, † University of Maryland

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:01:37
      35Cryptography / Computing / Internet / Internet Standards / Internet protocols / Cryptographic protocols / E-commerce / Public-key cryptography / Transport Layer Security / Hostname / X.509 / Public key certificate

      HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-03 15:58:27
      36Cryptography / Elliptic curve cryptography / EdDSA / Elliptic-curve cryptography / Elliptic Curve Digital Signature Algorithm / Curve25519 / Elliptic-curve DiffieHellman / Digital signature / Digital Signature Algorithm / Daniel J. Bernstein / Hash function / Public-key cryptography

      High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

      Add to Reading List

      Source URL: precision.moscito.org

      Language: English - Date: 2011-07-09 00:19:47
      37Modeling and simulation / Multi-agent systems / Simulation / Artificial intelligence / Systems science / Model checking / Agent-based model / Economic model / Intelligent agent / MAS

      Model Checking Multiagent Systems MAS for Security Multiagent System-based Verification of Security and Privacy

      Add to Reading List

      Source URL: cgi.csc.liv.ac.uk

      Language: English - Date: 2015-11-05 09:29:18
      38Cryptography / Public-key cryptography / Post-quantum cryptography / Smart cards / Hash-based cryptography / Digital signature / Cryptographic hash function / Java Card / Hash function / Security token / Cryptographic primitive / XMSS

      Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

      Add to Reading List

      Source URL: cryptojedi.org

      Language: English - Date: 2018-10-07 06:08:08
      39Denial-of-service attacks / Statistical inference / Cyberwarfare / Estimation theory / Computing / Denial-of-service attack / Internet Relay Chat / Domain name system / Anycast / Cross-validation / Regression analysis / Prediction

      Poster: A DDoS Peak Traffic Volume Prediction Method Based on Machine Learning Shuang Wei† , Yijing Ding† , Tongxin Li† , Shuaifu Dai‡ , Xinfeng Wu† and Xinhui Han†∗ † Peking University ‡ CNCERT/CC

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-27 07:43:28
      40Cryptography / Advanced Encryption Standard / Data Encryption Standard / AES implementations / ARM architecture / Block ciphers / DEAL / AES instruction set / CRYPTON

      All the AES You Need on Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen Radboud University, Digital Security Group, Nijmegen, The Netherlands ,

      Add to Reading List

      Source URL: ko.stoffelen.nl

      Language: English - Date: 2018-02-09 07:40:08
      UPDATE