De-anonymizing the Internet Using Unreliable IDs
CCCP: Secure remote storage for computational RFIDs
Passive RFID tags harvest their operating energy from an interrogating reader, but constant energy shortfalls severely limit their computational and storage capabilities. We propose Cryptographic Computational Continuation Passing (CCCP), a mechanism that amplifies programmable passive…
SANDstorm, Elliptic Curves, and a Bit of Fun
I’ll begin by describing SANDstorm, the Sandia entry in the NIST Hash Function competition. Next, I borrow an idea of Peter Montgomery’s to speed up elliptic curve calculations (Affine Strikes Back!). Finally, I’ll offer a…
Economics and the Underground Economy
Abductive Authorization Credential Gathering
A Secure Cryptographic Token Interface
When Is a Browser Not a Browser?
By Janie Chang, Writer, Microsoft Research Once upon a time, Web sites were the online equivalent of data sheets. Now users go to the Web to run business apps, do their banking, buy products, socialize,…