pages.cs.wisc.edu May 2017
05/04/2017
How to explain zero-knowledge protocols to your children (1998)
Write and Alice and Bob protocol, and get it translated into a Tamarin's input
www.infsec.ethz.ch May 2017
LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards
eprint.iacr.org April 2017
ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication
eprint.iacr.org April 2017
Auditing code for crypto flaws: the first 30 minutes
research.kudelskisecurity.com April 2017
Content Delivery over TLS: A Cryptographic Analysis of Keyless SSL
epubs.surrey.ac.uk April 2017
Post-quantum cryptography---dealing with the fallout of physics success
eprint.iacr.org April 2017