articlesterew.blogg.se

Ccs2015 toolkit github
Ccs2015 toolkit github








ccs2015 toolkit github

In IEEE Symposium on Security and Privacy (Oakland) 2015. "Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs". "Forward Secure Asynchronous Messaging from Puncturable Encryption". "Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice". "Accountable Privacy for Decentralized Anonymous Payments". In IEEE Symposium on Security and Privacy (Oakland) 2016. "Downgrade Resilience in Key-Exchange Protocols". "Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage". To appear in Security and Cryptography for Networks (SCN) 2016. "A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation". "A Protocol for Privately Reporting Ad Impressions at Scale". "A Systematic Analysis of the Juniper Dual EC Incident". "Outsourcing Medical Dataset Analysis: A Possible Solution". "Bolt: Anonymous Payment Channels for Decentralized Currencies". "Verified Correctness and Security of mbedTLS HMAC-DRBG".

ccs2015 toolkit github

"Fairness in an Unfair World: Computation from Append-only Ledgers". "How to Squeeze a Crowd: Reducing Bandwidth in Mixing Cryptocurrencies". "Practical state recovery attacks against legacy RNG implementations". "Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers". In IEEE Symposium on Security & Privacy 2020. "ZEXE: Enabling Decentralized Private Computation". "Using SMT Solvers to Automate Chosen Ciphertext Attacks".

ccs2015 toolkit github

"KeyForge: Non-Attributable Email from Forward-Forgeable Signatures". "Abuse-Resistant Law Enforcement Access Systems". "Meteor: Cryptographically Secure Steganography for Realistic Distributions". "Fluid MPC: Secure Multiparty Computation with Dynamic Participants".

ccs2015 toolkit github

Started as a lazy man's attempt to write a book on practical crypto topics, this has gradually taken on a life of its own. My BlogĪ Few Thoughts on Cryptographic Engineering. Fall 2015.Ħ00.642: Advanced Topics in Cryptography. Spring 2018.Ħ00.443: Security and Privacy in Computing. Fall 2020, Spring 2019.Ħ01.745: Advanced Topics in Applied Cryptography. Additionally, I've designed several cryptographic tools, including Charm, a framework for rapidly prototyping cryptosystems, and a Functional Encryption library that provides implementations of several new Attribute Based Encryption schemes.Ħ01.741: Advanced Topics in Secure and Censorship-Resistant Communications. I teach an introductory course on this subject. This work involves understanding the practical aspects of cryptographic systems, implementing cryptographic protocols, and in some cases reverse-engineering deployed systems. I also work in the area of cryptographic engineering. Additionally, I have been working on new automation techniques to assist in the design and deployment of advanced cryptographic protocols. I have also developed protocols that allow users to access databases without revealing which data they're accessing. My recent work includes developing privacy-preserving cryptographic protocols for implementing anonymous electronic cash and identification. My research focus is in the area of applied cryptography. Laboratories/Research in Florham Park, NJ. Fromġ999-2003, I served as a senior technical staff member at AT&T I was formerly a partner in Independent Security Evaluators, a custom security evaluation and design consultancy and I currently consult independently. I am one of the creators of the Zerocash protocol, which is used by the Zcash cryptocurrency, and a founder of an encryption startup Zeutro. Storage, anonymous payment systems, and bilinear map-basedĬryptography. My research includes techniques for privacy-enhanced information I am an Associate Professor at the Johns Hopkins Information Security Institute.










Ccs2015 toolkit github