Quantcast
Channel: Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE)
Browsing all 5 articles
Browse latest View live

Handouts: Introduction to Cryptography

Outline: - Probabilistic encryption - Identity-Based Public-Key Cryptography - Fair Coin Flipping Using Public-Key Cryptography - Fair Cryptosystems (Key Escrow) - Zero Knowledge Interactive Proof Systems

View Article



Introduction to Cryptography, Part I: Probabilistic Encryption

Outline: - Why do we need probabilistic encryption? - The idea behind - Optimized algorithm - Drawbacks

View Article

Introduction to Cryptography, Part II

Outline: - Probabilistic encryption -- Average Case Computational Di culty and the Worst Case Di culty - Identity-Based Public-Key Cryptography - Fair Coin Flipping Using Public-Key Cryptography - Fair...

View Article

Source Attribution of Cryptographic API Misuse in Android Applications

Recent research suggests that 88% of Android applications that use Java cryptographic APIs make at least one mistake, which results in an insecure implementation. It is unclear, however, if these...

View Article

Analysis of Data-At-Rest Security In Smartphones

With almost two billion users worldwide, smartphones are used for almost everything – booking a hotel, ordering a cup of coffee, or paying in a shop. However, small size and high mobility makes these...

View Article

Browsing all 5 articles
Browse latest View live




Latest Images