Quantifying Trust
Cryptography Receives Indian Scrutiny
By Rob Knies, Managing Editor, Microsoft Research You employ cryptographic techniques on a daily basis … don’t you? Sure you do. Every time you type a password into a computer, you are practicing cryptography, using…
Building Systems That Enforce Measurable Security Goals
In this talk, I will argue for an approach for building and deploying systems that enforce measurable security goals. Historically, the security community has developed “ideal” goals for security, but conventional systems are not built…
Reliable Evidence: Auditability by Typing
Number Theory and Arithmetic Geometry
Research on number theory and arithmetic geometry Related Links Cryptography group Events Computer Security and Cryptography (April 12-16, 2010)
Pairing-based Non-interactive Zero-Knowledge Proofs
Non-interactive zero-knowledge proofs make it possible to prove the truth of a statement without revealing any other information. They have been used widely in the theory of cryptography, but due to efficiency problems have not…