Zobrazeno 1 - 10
of 46
pro vyhledávání: '"Thomas Shrimpton"'
Publikováno v:
2022 IEEE Symposium on Security and Privacy (SP).
Autor:
Animesh Chhotaray, Thomas Shrimpton
Publikováno v:
2022 IEEE Symposium on Security and Privacy (SP).
Autor:
Thomas Shrimpton, Christopher Patton
Publikováno v:
Advances in Cryptology – CRYPTO 2020 ISBN: 9783030567835
CRYPTO (1)
CRYPTO (1)
We give a framework for relating the concrete security of a “reference” protocol (say, one appearing in an academic paper) to that of some derived, “real” protocol (say, appearing in a cryptographic standard). It is based on the indifferentia
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fbc21bc5ca703b706c5255c01356e120
https://doi.org/10.1007/978-3-030-56784-2_4
https://doi.org/10.1007/978-3-030-56784-2_4
Publikováno v:
CCS
Probabilistic data structures use space-efficient representations of data in order to (approximately) respond to queries about the data. Traditionally, these structures are accompanied by probabilistic bounds on query-response errors. These bounds im
Autor:
Yevgeniy Dodis, Thomas Shrimpton
This book constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the 4-volume proceedings LNCS 13507, 13
Autor:
Kevin R. B. Butler, Christopher Patton, Thomas Shrimpton, Dave (Jing) Tian, Grant Hernandez, Benjamin Mood, Joseph I. Choi, Patrick Traynor
Publikováno v:
AsiaCCS
A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function $f$ of their private inputs, while leaking nothing more. In a sense, such a protocol realizes a trusted oracle that computes $f$ an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8bc332ce09a06cb1b86e89c4f7e8b76e
http://arxiv.org/abs/1905.01233
http://arxiv.org/abs/1905.01233
Autor:
Christopher Patton, Thomas Shrimpton
Publikováno v:
Advances in Cryptology – CRYPTO 2019 ISBN: 9783030269470
CRYPTO (1)
CRYPTO (1)
Key separation is often difficult to enforce in practice. While key reuse can be catastrophic for security, we know of a number of cryptographic schemes for which it is provably safe. But existing formal models, such as the notions of joint security
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9fea59496fd8c129a7d0509543260681
https://doi.org/10.1007/978-3-030-26948-7_26
https://doi.org/10.1007/978-3-030-26948-7_26
Autor:
Rachel Culpepper, Thomas Shrimpton, Luis Vargas, Patrick Traynor, Gyan Hazarika, Doug Szajda, Kevin R. B. Butler
Publikováno v:
CCS
Data breaches represent a significant threat to organizations. While the general problem of protecting data has received much attention, one large (and growing) class has not - data that must be kept due to mandatory retention laws. Such data is ofte
Autor:
Christopher Patton, Thomas Shrimpton
Publikováno v:
CCS
We advance the study of secure stream-based channels (Fischlin et al., CRYPTO '15) by considering the multiplexing of many data streams over a single channel, an essential feature of real world protocols such as TLS. Our treatment adopts the definiti
Publikováno v:
CCS
We provide an analysis of IEEE standard P1735, which describes methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP. We find a surprising number of cryptographic mistakes in the s