Presentaciones de la Crypto 2012 rump
Listado de las presentaciones (PDF) de la Crypto 2012 rump:
- Welcome to the rump session
- IACR 2012 Fellows Induction Ceremony
- Celebrating the 25th year of FEAL - A new prize problem
- The relevance of the Chinese Lotto: 25 years outsourcing of cryptanalysis
- Improved Key Recovery Attacks on Reduced-Round AES
- The End of Encryption based on Card Shuffling
- Perfect Hellman Tables using Bloom Filters
- Entropy
- Online movies that cannot be copied
- Double blind reviewing in IACR conferences, revisited
- Does the ePrint Archive hurt Cryptographers?
- The end of crypto
- The Security of Very Dense Cryptography
- Open Source Implementations of Hash Functions in an Atmel AtTiny45
- SHA--3 Update & NIST Thank You
- Edwards Curves and Fault Attacks
- COTORI(TM): Cryptosystems On TORI
- Breaking Pairing-based Cryptosystems using $\eta_T$ Pairing over $GF(3^{97})$
- Synthesis of OWF-based Encryption Schemes
- Attribute-Based Encryption from Lattices
- Efficient (Hierarchical) Inner Product Encryption Tightly Reduced from the Decisional Linear Assumption
- Padding Oracles Revisited
- The case of the RSA FUCK-A-DUCK certificate
- Cryptography in the Streaming Model
- Midgame Attacks
- Coalition between Bob and Eve in the Man In The Middle Attack
- Publicly Verifiable Delegation of Large Polynomials and Matrix Computations
- How Useful are Random Oracles?
- Positive results for concurrently secure computation in the plain model
- PKC + MPC + Internet voting implies ``secret endorsements'', or, how politicians can keep their friends
- CryptINKgraphy
- Random-Sample Elections: Far lower cost, better quality and more democratic
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec