Publication
Compact E-Cash and Simulatable VRFs Revisited
Publication
De-anonymizing the Internet Using Unreliable IDs
Video
CCCP: Secure remote storage for computational RFIDs
Passive RFID tags harvest their operating energy from an interrogating reader, but constant energy shortfalls severely limit their computational and storage capabilities. We propose Cryptographic Computational Continuation Passing (CCCP), a mechanism that amplifies programmable passive…
Video
SANDstorm, Elliptic Curves, and a Bit of Fun
I’ll begin by describing SANDstorm, the Sandia entry in the NIST Hash Function competition. Next, I borrow an idea of Peter Montgomery’s to speed up elliptic curve calculations (Affine Strikes Back!). Finally, I’ll offer a…
Publication
Economics and the Underground Economy
Publication
A Secure Cryptographic Token Interface
Publication