Linked e-resources
Details
Table of Contents
Secure computation: primitives and new models
Public key cryptographic primitives
Secure computation II: applications
Anonymity and related applications
Cryptanalysis and attacks (symmetric crypto)
Privacy and policy enforcement
Authentication via eye tracking and proofs of proximity
Malware analysis and side channel attacks
Side channel countermeasures and tamper resistance/PUFs
Leakage resilience and pseudorandomness.
Public key cryptographic primitives
Secure computation II: applications
Anonymity and related applications
Cryptanalysis and attacks (symmetric crypto)
Privacy and policy enforcement
Authentication via eye tracking and proofs of proximity
Malware analysis and side channel attacks
Side channel countermeasures and tamper resistance/PUFs
Leakage resilience and pseudorandomness.