Technical Reports
2015 Technical Reports
-
N. Koblitz and A. Menezes
The Random Oracle Model: A Twenty-Year Retrospective
pdf
CACR 2015-01
-
N. Unger, S. Dechand, J. Bonneau, S. Fahl, H. Perl, I. Goldberg and M. Smith
SoK: Secure Messaging
pdf
CACR 2015-02
-
R. Azarderakhsh, D. Jao and H. Lee
Common Subexpression Algorithms for Space-Complexity Reduction
of Gaussian Normal Basis Multiplication
pdf
CACR 2015-03
-
G. Gong
Physical Layer Secure Information Exchange Protocol for MIMO Ad-hoc
Networks Against Passive Attackers
pdf
CACR 2015-04
-
Q. Liu, G. Gong, Y. Wang and H. Li
Secrecy Capacity Achieving with Physical Layer Security Approach
in MIMO Two-Way Relay Channels
pdf
CACR 2015-05
-
C. Bocovich, J. Doucette and I. Goldberg
Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage
pdf
CACR 2015-06
-
G. Yang, B. Zhu, V. Suder, M. Aagaard and G. Gong
The Simeck Family of Lightweight Block Ciphers
pdf
CACR 2015-07
-
T. Wang and I. Goldberg
Walkie-Talkie: An Effective and Efficient Defense against
Website Fingerprinting
pdf
CACR 2015-08
-
T. Wang and I. Goldberg
On Realistically Attacking Tor with Website Fingerprinting
pdf
CACR 2015-09
-
T. Elahi, C. Swanson and I. Goldberg
Slipping Past the Cordon: A Systematization of Internet Censorship
Resistance
pdf
CACR 2015-10
-
T. Elahi, J. Doucette, H. Hosseini, S.J. Murdoch and I. Goldberg
A Framework for the Game-theoretic Analysis of Censorship Resistance
pdf
CACR 2015-11
-
J. F. Biasse and F. Song
A note on the quantum attacks against schemes relying on the
hardness of finding a short generator of an ideal in ℚ(𝜁2ⁿ)
pdf
CACR 2015-12
-
K. Mayo
A primer on cryptographic multilinear maps and code obfuscation
pdf
CACR 2015-13
-
N. Koblitz and A. Menezes
A riddle wrapped in an enigma
pdf
CACR 2015-14

|