Tendermint: Byzantine fault tolerance in the age of blockchains

E Buchman - 2016 - atrium.lib.uoguelph.ca
Tendermint is a new protocol for ordering events in a distributed network under adversarial
conditions. More commonly known as consensus or atomic broadcast, the problem has …

Frodo: Take off the ring! practical, quantum-secure key exchange from LWE

J Bos, C Costello, L Ducas, I Mironov… - Proceedings of the …, 2016 - dl.acm.org
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …

A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks

P Gope, T Hwang - IEEE Transactions on industrial electronics, 2016 - ieeexplore.ieee.org
User authentication in wireless sensor networks (WSN) is a critical security issue due to their
unattended and hostile deployment in the field. Since the sensor nodes are equipped with …

How secure is TextSecure?

T Frosch, C Mainka, C Bader, F Bergsma… - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
Instant Messaging has gained popularity by users for both private and business
communication as low-cost short message replacement on mobile devices. However, before …

[图书][B] Kryptografie verständlich

C Paar, J Pelzl - 2016 - Springer
Dies ist die deutsche Übersetzung von „Understanding Cryptography “. Das Buch ist im Jahr
2010 in englischer Sprache erschienen und hat sich schnell zu einem Klassiker in der …

Measuring the security harm of TLS crypto shortcuts

D Springall, Z Durumeric, JA Halderman - Proceedings of the 2016 …, 2016 - dl.acm.org
TLS has the potential to provide strong protection against network-based attackers and
mass surveillance, but many implementations take security shortcuts in order to reduce the …

[PDF][PDF] Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services.

C Zuo, W Wang, Z Lin, R Wang - NDSS, 2016 - ndss-symposium.org
Most mobile apps today require access to remote services, and many of them also require
users to be authenticated in order to use their services. To ensure the security between the …

Authentication based on non-interactive zero-knowledge proofs for the internet of things

This paper describes the design and analysis of a new scheme for the authenticated
exchange of confidential information in insecure environments within the Internet of Things …

Innovative enhancement of the Caesar cipher algorithm for cryptography

SN Gowda - 2016 2nd International Conference on Advances …, 2016 - ieeexplore.ieee.org
The Caesar Cipher algorithm for cryptography is one of the oldest algorithms. Now much
newer algorithms have arrived that are much more secure, however in terms of speed of …

Safely exporting keys from secure channels: on the security of EAP-TLS and TLS key exporters

C Brzuska, H Jacobsen, D Stebila - … on the Theory and Applications of …, 2016 - Springer
We investigate how to safely export additional cryptographic keys from secure channel
protocols, modelled with the authenticated and confidential channel establishment (ACCE) …