Cypherpunks

Results: 193



#Item
81Computer network security / Computer security / Cyberwarfare / Internet protocols / Denial-of-service attacks / Transmission Control Protocol / Tor / SOCKS / Port knocking / Computing / Internet privacy / Internet

BridgeSPA: Improving Tor Bridges with Single Packet Authorization Rob Smits Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-08-21 13:43:29
82Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data

Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-01-13 10:28:23
83World Wide Web / Cypherpunks / Julian Assange / European Arrest Warrant / Swedish Judicial Authority v Julian Assange / The World Tomorrow / WikiLeaks / Law / Security

1 www.theoneclickgroup.co.uk TWEET RECORD Julian Assange Extradition

Add to Reading List

Source URL: www.theoneclickgroup.co.uk

Language: English - Date: 2011-07-14 14:35:16
84Security / Paillier cryptosystem / Merkle–Hellman knapsack cryptosystem / Niederreiter cryptosystem / Cryptography / Post-quantum cryptography / Cryptosystem / RSA / Semantic security / Public-key cryptography / Cyberwarfare / Applied mathematics

Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-05-05 15:39:42
85Data / Private information retrieval / Information / Database theory / Whois / Oblivious transfer / Database / Server / Cryptographic protocols / Computing / Database management systems

One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries Ryan Henry, Yizhou Huang, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo ON, Canada N2L 3

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-12-11 07:56:46
86Voice over IP / Videotelephony / Computer network security / Internet privacy / Broadband / Skype protocol / Deep packet inspection / Tor / Traffic shaping / Software / Computing / Skype

SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-08-25 10:47:50
87Cypherpunks / Cryptographic software / Internet privacy / Tor / Institute of Electrical and Electronics Engineers / Nikita Borisov / Bangladesh University of Engineering and Technology / Apache Hadoop / Cloud computing / Computing / Software / Free software

Anupam Das Curriculum Vitae Contact Information

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-12-01 15:23:20
88Electronic commerce / Cryptographic protocols / Digital signature / Blind signature / RSA / BLS / Full Domain Hash / Token / Ecash / Cryptography / Public-key cryptography / Financial cryptography

SPEcTRe: Spot-checked Private Ecash Tolling at Roadside Jeremy Day Yizhou Huang Edward Knapp

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-08-21 13:44:16
89Cryptographic software / Onion routing / Tor / Universal composability / Traffic analysis / Public-key cryptography / Crowds / Cryptography / Internet privacy / Routing

Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg Aniket Kate Esfandiar Mohammadi Saarland University and MPI-SWS University of Waterloo

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-04-29 17:48:07
90Computing / Internet / Network architecture / Transport Layer Security / Cipher suite / Telex / Proxy server / Transmission Control Protocol / HTTP Secure / Cryptographic protocols / Secure communication / Internet protocols

Telex: Anticensorship in the Network Infrastructure Eric Wustrow∗ ∗ The Scott Wolchok∗

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-07-18 09:40:53
UPDATE