Tendermint: Byzantine fault tolerance in the age of blockchains
E Buchman - 2016 - atrium.lib.uoguelph.ca
Tendermint is a new protocol for ordering events in a distributed network under adversarial
conditions. More commonly known as consensus or atomic broadcast, the problem has …
conditions. More commonly known as consensus or atomic broadcast, the problem has …
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …
resistant to quantum computers. Following increasing interest from both companies and …
A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks
P Gope, T Hwang - IEEE Transactions on industrial electronics, 2016 - ieeexplore.ieee.org
User authentication in wireless sensor networks (WSN) is a critical security issue due to their
unattended and hostile deployment in the field. Since the sensor nodes are equipped with …
unattended and hostile deployment in the field. Since the sensor nodes are equipped with …
How secure is TextSecure?
Instant Messaging has gained popularity by users for both private and business
communication as low-cost short message replacement on mobile devices. However, before …
communication as low-cost short message replacement on mobile devices. However, before …
Measuring the security harm of TLS crypto shortcuts
TLS has the potential to provide strong protection against network-based attackers and
mass surveillance, but many implementations take security shortcuts in order to reduce the …
mass surveillance, but many implementations take security shortcuts in order to reduce the …
[PDF][PDF] Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services.
C Zuo, W Wang, Z Lin, R Wang - NDSS, 2016 - ndss-symposium.org
Most mobile apps today require access to remote services, and many of them also require
users to be authenticated in order to use their services. To ensure the security between the …
users to be authenticated in order to use their services. To ensure the security between the …
Authentication based on non-interactive zero-knowledge proofs for the internet of things
This paper describes the design and analysis of a new scheme for the authenticated
exchange of confidential information in insecure environments within the Internet of Things …
exchange of confidential information in insecure environments within the Internet of Things …
Innovative enhancement of the Caesar cipher algorithm for cryptography
SN Gowda - 2016 2nd International Conference on Advances …, 2016 - ieeexplore.ieee.org
The Caesar Cipher algorithm for cryptography is one of the oldest algorithms. Now much
newer algorithms have arrived that are much more secure, however in terms of speed of …
newer algorithms have arrived that are much more secure, however in terms of speed of …
Safely exporting keys from secure channels: on the security of EAP-TLS and TLS key exporters
We investigate how to safely export additional cryptographic keys from secure channel
protocols, modelled with the authenticated and confidential channel establishment (ACCE) …
protocols, modelled with the authenticated and confidential channel establishment (ACCE) …