Handouts: Introduction to Cryptography
Outline: - Probabilistic encryption - Identity-Based Public-Key Cryptography - Fair Coin Flipping Using Public-Key Cryptography - Fair Cryptosystems (Key Escrow) - Zero Knowledge Interactive Proof Systems
View ArticleIntroduction to Cryptography, Part I: Probabilistic Encryption
Outline: - Why do we need probabilistic encryption? - The idea behind - Optimized algorithm - Drawbacks
View ArticleIntroduction to Cryptography, Part II
Outline: - Probabilistic encryption -- Average Case Computational Di culty and the Worst Case Di culty - Identity-Based Public-Key Cryptography - Fair Coin Flipping Using Public-Key Cryptography - Fair...
View ArticleSource Attribution of Cryptographic API Misuse in Android Applications
Recent research suggests that 88% of Android applications that use Java cryptographic APIs make at least one mistake, which results in an insecure implementation. It is unclear, however, if these...
View ArticleAnalysis of Data-At-Rest Security In Smartphones
With almost two billion users worldwide, smartphones are used for almost everything – booking a hotel, ordering a cup of coffee, or paying in a shop. However, small size and high mobility makes these...
View Article
More Pages to Explore .....