Presentaciones de la Crypto Rump 2013
Crypto Rump es un evento de un sólo día donde se presentan temas sobre cifrado. Las presentaciones son cortas y el evento dura sobre unas 3 horas y media. Crypto Rump 2013 se celebró el pasado 20 de agosto. Aquí tenéis el listado de las diapositivas:
- Chairs' report for Crypto 2013
- EyeDecrypt -- Private Interactions in Plain Sight
- How to make 400+ cryptographers appreciate your creativity
- The FEAL Cipher Prize Problem -Winner Announcement-
- Solving the FEAL 25 Years Prize Problems
- Factoring as a service
- Cryptanalysis of MDS-POTI
- NIST Update
- Spyin' NSA
- On the Security of RC4 in TLS
- Weakness of GF$(3^{6 \cdot 509})$ for Discrete Logarithm Cryptography
- Candidate Indistinguishability Obfuscation, Or Sell Apple, Buy Samsung
- How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
- How to keep a secret: Leakage Deterring Public-Key Cryptosystems
- Random Number Generation, Revisited
- Naturally Rehearsing Passwords
- Computational Fuzzy Extractors
- Factoring RSA keys from certified smart cards: Coppersmith in the wild
- Warsaw is cool
- Under Surveillance
- An Improved Attack on 4-Round Even-Mansour with 2 Alternating Keys
- Quantum Time Capsules & Unknown Recipient Encryption
- Delegatable Pseudorandom Functions and Applications
- Fully-Anonymous Functional Proxy-Re-Encryption
- Shorter Quasi-Adaptive NIZKs for Linear Subspaces
- Communication complexity of the forge-and-lose technique
- The million-entry ORAM on MPC
- Announcing SCAPI: the Secure Computation API
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec