Title |
Conference |
Tags |
Digital Contact Tracing |
29thUSENIXSecuritySymposium-2020 - Berkeley, USA |
|
Correcting Subverted Random Oracles |
Crypto2018-2018 - Santa Barbara, USA |
|
Memories for Your Eyes Only |
RWC-2017 - new york city,usa |
|
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security |
AsiaCrypt-2014 - kaohsiung,taiwan |
|
Order-Preserving Encryption Secure Beyond One-Wayness |
AsiaCrypt-2014 - kaohsiung,taiwan |
|
Technical session 17: Secret Sharing |
AsiaCrypt-2014 - kaohsiung,taiwan |
|
The Drunk Motorcyclist Protocol for Anonymous Communication |
CNS-2014 - san francisco,usa |
|
Post-Snowden Cryptography |
EuroCrypt-2014 - copenhagen,denmark |
|
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures |
EuroCrypt-2014 - copenhagen,denmark |
|
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency |
asiacrypt-2013 - Bengalore,India |
|
Applied Cryptography and Network Security 10 years in the past and 10 years in the future |
10th International Conference on Applied Cryptography and Network Security-2012 - Singapore |
Security
|
Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens |
10th International Conference on Applied Cryptography and Network Security-2012 - Singapore |
|
Applied Cryptography and Network Security – 10 years in the past and 10 years in the future |
ACNS-2013 - Alberta,Canada |
Security
|
Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens |
ACNS-2013 - Alberta,Canada |
|
From Protecting a System to Protecting the Global Ecosystem |
CMS-2011 - Ghent, Belgium |
Security
|
“Yes We Can’T!” - On Kleptography And Cryptovirology |
Chaos Communication Congress-26 - Berlin, Germany |
Security
Cryptography
Malware
|