Presentaciones de la Crypto Rump 2014
Crypto Rump es un evento de un sólo día donde se presentan temas sobre cifrado. Las presentaciones son cortas y el evento dura poco menos de 4 horas. Este año dicho evento se celebró el 19 de agosto. Como de costumbre, os dejamos la lista con las presentaciones que están publicadas:
- Program Co-Chairs Report
- Privacy, Security & Trust
- Tetris-based Cryptography: a gateway to serious Crypto
- Cryptogramma.com
- Public Verifiable Randomness Beacon for Random Sample Elections
- Deniable and not self-harming trapdoors
- NIST VCAT Report and Dual EC DRBG
- NIST Update: Elliptic Curves and More!
- New Cryptography Libraries from Microsoft Research
- Bits Security of the CDH Problems over Finite Fields
- Fast Lattice Point Enumeration with Minimal Overhead
- Jobs available
- Just a little of that human touch
- Update on the 10000 Euro PRINCE cipher-breaking challenge: Results of Round-1
- On the Security of the FX-Construction (feat. PRINCE and PRIDE)
- Spritz: a spongy RC4-like stream cipher and hash function
- Randomness Extraction with Streaming Algorithms
- The graduate acoustic attack: The sound of silence
- DNSSEC
- SPOKE: Simple Password-Only Key Exchange in the Standard Model
- How Secure and Quick is QUIC in Presence of Malice?
- An Exercise in Shooting Yourself in the Foot: Automating the Cryptographer
- The Bitcoin Backbone: Analysis and Applications
- A New Non-Malleable Commitment Scheme
- Multiparty illumination
- Postponing the Deadline of the Best Crypto Competition Ever!
- Circuit ORAM and on the Tightness of the Goldreich-Ostrovsky ORAM Lower Bound
- Oblivious Data Structures
- SCVM: An Efficient, Automated RAM Model Secure Computation Framework
- Awesome MPC
- Introducing TinyLEGO, smaller is sometimes better
- An Annotated Bibliography of Practical Secure Computation
- A Unifying Framework for Computation on Encrypted Data
- New Graded Multilinear Maps from Lattices
- Fully Secure Attribute Based Encryption from Multilinear Maps
- Implementing Cryptographic Program Obfuscation
- Order-Revealing Encryption
- Verifiable Member and Order Queries on a List in Zero Knowledge
- Four minutes of fast talking about order-preserving encryption
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec