Nicholas J. Hopper. Thesis title: Toward A Computational Theory of Steganography
|
|
|
- Randall Washington
- 10 years ago
- Views:
Transcription
1 Nicholas J. Hopper Computer Science Department (412) Research Interests Theoretical Computer Science, specializing in Theoretical Cryptography, with interests in Complexity Theory and Computational Learning Theory; Computer and Network Security, focusing on security protocols, humans in computer security, and the application of cryptographic tools and analyses to privacy concerns. Education Pittsburgh, PA Ph.D. Student, Computer Science Thesis title: Toward A Computational Theory of Steganography Thesis Advisor: Manuel Blum Expected Completion: July 2004 University of Minnesota Morris, MN B.A., with high distinction, majors in Mathematics and Computer Science, 1999 GPA: 4.0/4.0 Publications [AH02] Luis von Ahn and Nicholas J. Hopper. Public Key Steganography. To appear in: Proceedings of Eurocrypt 2004, May [ABoH03] Luis von Ahn, Andrew Bortz, and Nicholas J. Hopper. k-anonymous Message Transmission. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), October
2 [ABHL03] Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford. CAPTCHA: Using Hard AI Problems for Security. In: Proceedings of Eurocrypt 2003, May [HLV02] Nicholas J. Hopper, John Langford, and Luis von Ahn. Provably Secure Steganography. In: Proceedings of CRYPTO 2002, August [HB01] Nicholas J. Hopper and Manuel Blum, Secure Human Identification Protocols. In: Proceedings of Asiacrypt 2001, December [HSW00] Nicholas J. Hopper, Sanjit A. Seshia and Jeannette M. Wing, Combining Theory Generation and Model Checking for Security Protocol Analysis. At: Workshop on Formal Methods in Computer Security, July [MH99a] Nicholas Freitag McPhee and Nicholas J. Hopper, Analysis of genetic diversity through population history. In: GECCO-99: Proceedings of the Genetic and Evolutionary Computation Conference, July [MH99b] Nicholas Freitag McPhee and Nicholas J. Hopper, AppGP: An alternative structural representation for GP. In: Proceedings of the 1999 Congress on Evolutionary Computation, June [MHR98] Nicholas Freitag McPhee, Nicholas J. Hopper and Mitchell L. Reierson, Impact of types on essentially typeless problems in GP. In: Genetic Programming 1998: Proceedings of the Third Annual Conference, July In Progress [H03] Nicholas J. Hopper Covert Public-Key Infrastructures. Manuscript, [AH03] Luis von Ahn and Nicholas J. Hopper. An Empirical Study of WWW Password Security. Manuscript in preparation, [ABe+03] Luis von Ahn, Alina Beygelzimer, Nicholas J. Hopper, and John Langford. Covert Multiparty Computation. Manuscript in preparation, [AHL04] Luis von Ahn, Nicholas J. Hopper, and John Langford. Covert Two-Party Computation. Submitted to CRYPTO Academic Honors and Awards National Merit Scholar ( ) University of Minnesota Presidential Scholarship ( ) ACM World Programming Contest Finalist (1997) McCree Award for Achievement and Potential in the Mathematical Sciences ( ) Scholar of the College, University of Minnesota, Morris (1999) 2
3 NSF Graduate Research Fellowship Program, Honorable Mention (1999) NSF Graduate Research Fellowship ( ) Siebel Scholar (2004) Teaching Experience Algorithms, Fall 2000: Teaching Assistant, taught a weekly recitation and designed and graded homework and exam problems. Security and Cryptography, Fall 2001: Teaching Assistant, gave several lectures, designed and graded all homeworks and exams. Foundations of Theoretical Cryptography, Spring 2003: Instructor, developed and taught graduate course on theoretical cryptography. Supervised undergraduate research: Preston Tollinger: A Secure, Device-Free Challenge-Response Protocol, CMU Senior Thesis, Ann Lewis: A Steganographic Text Editor, NSF Aladdin REU Project, 2002 Andrew Bortz: Anonymous Communications, NSF Aladdin REU Project, 2003 Adam Bender: HumanAut, NSF Aladdin REU Project, 2003 Academic & Professional Service CMU Computer Science Department Doctoral Review Committee, CMU Computer Science Department Ph.D. Admissions Committee, 2002, Program Committee, CEC Special Session on Security (2003). Paper referee for: Science (2000), STOC 2004, Eurocrypt 2004, IH 2004, M&SOM (2004). Conference and Workshop Presentations Secure Human Identification Protocols, Asiacrypt 2001, Gold Coast, Australia, December Human Interactive Proofs. NSF ALADDIN Workshop on Human Interactive Proofs, Palo Alto, January Provably Secure Steganography, Crypto 2002, Santa Barbara, August
4 k-anonymous Message Transmission. DATA, Pittsburgh, April NSF ALADDIN Workshop on Privacy in Machine Learning and Reductions in Cryptography. (Invited) Workshop on Machine Learning Reductions, Chicago, September References Professor Manuel Blum Computer Science Department (412) Professor Michael Reiter Hammerschlag Hall, Room D208 (412) Professor Steven Rudich Computer Science Department (412) Asst. Professor David Wagner EECS Computer Science Division University of California, Berkeley Berkeley, CA (510) Other Professional Experience University of Minnesota Morris, MN Research Assistant, Computer Science Department. Investigated impact of program representation on performance of Genetic Programming for learning simple concept classes. University of Minnesota Morris, MN Grader, Computer Science Department. Graded papers and assisted with labs for upper-division courses in Networks, Databases, and Software Design. Andersen Consulting Enterprises Minneapolis, MN Summer Intern. Performed and automated various systems and database administration tasks related to new and upgraded installations of a production airline accounting system, resulting in annual savings of over $100K. 4
5 Abstracts of accepted and submitted papers 1. Luis von Ahn, Nicholas J. Hopper, and John Langford. Covert Two-Party Computation. Submitted to CRYPTO Abstract. We introduce the novel concept of covert two-party computation. Whereas ordinary secure two-party computation only guarantees that no more knowledge is leaked about the inputs of the individual parties than the result of the computation, covert two-party computation employs steganography to yield the following additional guarantees: (A) no outside eavesdropper can determine whether the two parties are performing the computation or simply communicating as they normally do; (B) before learning f(x A, x B ), neither party can tell whether the other is running the protocol; (C) after the protocol concludes, each party can only determine if the other ran the protocol insofar as they can distinguish f(x A, x B ) from uniformly chosen random bits. Covert two-party computation thus allows the construction of protocols that return f(x A, x B ) only when it equals a certain value of interest (such as Yes, we are romantically interested in each other ) but for which neither party can determine whether the other even ran the protocol whenever f(x A, x B ) does not equal the value of interest. We introduce security definitions for covert two-party computation and we construct protocols with provable security based on the Decisional Diffie-Hellman assumption. 2. Luis von Ahn and Nicholas J. Hopper. Public-Key Steganography. To appear in: Advances in Cryptology : Proceedings of Eurocrypt 2004, May Abstract. Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary cannot even detect that these hidden messages are being sent. Unlike previous settings in which provable security has been applied to steganography, public-key steganography is information-theoretically impossible. In this work we introduce computational security conditions for public-key steganography similar to those introduced by Hopper, Langford and von Ahn for the private-key setting. We also give the first protocols for public-key steganography and steganographic key exchange that are provably secure under standard cryptographic assumptions. Additionally, in the random oracle model, we present a protocol that is secure against adversaries that have access to a decoding oracle (a steganographic analogue of Rackoff and Simon s attacker-specific adaptive chosen-ciphertext adversaries fr om CRYPTO 91). 3. Luis von Ahn, Andrew Bortz, and Nicholas J. Hopper. k-anonymous Message Transmission. In: CCS 2003: Proceedings of the 10th annual ACM Conference on Computer and Communications Security, October Abstract. Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down its search to a set of k suspects. Receiver k-anonymity places a similar guarantee on the receiver: an adversary, at best, can only narrow down the possible receivers to a set of size k. In this paper we introduce the notions of sender and receiver k-anonymity and consider their applications. We show that there exist simple and efficient protocols which are k-anonymous for both the sender and the receiver in a model where a polynomial time adversary can see all traffic in the network and can control up to a constant fraction of the participants. Our protocol is provably secure, practical, and does not require the existence of trusted third parties. This paper also provides a conceptually simple augmentation to 5
6 Chaum s DC-Nets that adds robustness against adversaries who attempt to disrupt the protocol through perpetual transmission or selective non-participation. 4. Luis von Ahn, Manuel Blum, Nicholas J. Hopper and John Langford. CAPTCHA: using Hard AI problems for security. In: Advances in Cryptology : Proceedings of Eurocrypt 2003, May Abstract. We introduce captcha, an automated test that humans can pass, but current computer programs can t pass: any program that has high success over a captcha can be used to solve an unsolved Artificial Intelligence (AI) problem. We provide several novel constructions of captchas. Since captchas have many applications in practical security, our approach introduces a new class of hard problems that can be exploited for security purposes. Much like research in cryptography has had a positive impact on algorithms for factoring and discrete log, we hope that the use of hard AI problems for security purposes allows us to advance the field of Artificial Intelligence. We introduce two families of AI problems that can be used to construct captchas and we show that solutions to such problems can be used for steganographic communication. captchas based on these AI problem families, then, imply a win-win situation: either the problems remain unsolved and there is a way to differentiate humans from computers, or the problems are solved and there is a way to communicate covertly on some channels. 5. Nicholas J. Hopper, John Langford, and Luis von Ahn. Provably Secure Steganography. In: Advances in Cryptology: Proceedings of CRYPTO 2002, August Abstract. Informally, steganography is the process of sending a secret message from Alice to Bob in such a way that an eavesdropper (who listens to all communications) cannot even tell that a secret message is being sent. In this work, we initiate the study of steganography from a complexity-theoretic point of view. We introduce definitions based on computational indistinguishability and we prove that the existence of one-way functions implies the existence of secure steganographic protocols. 6. Nicholas J. Hopper and Manuel Blum. Secure Human Identification Protocols. In: Advances in Cryptology: Proceedings of Asiacrypt 2001, December Abstract. One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of protocols for secure identification which require various forms of trusted hardware or software, aimed at protecting privacy and financial assets. But how do we verify our identity, securely, when we don t have or don t trust our smart card, palmtop, or laptop? In this paper, we provide definitions of what we believe to be reasonable goals for secure human identification. We demonstrate that existing solutions do not meet these reasonable definitions. Finally, we provide solutions which demonstrate the feasibility of the security conditions attached to our definitions, but which are impractical for use by humans. 7. Nicholas J. Hopper, Sanjit Seshia, and Jeannette M. Wing. Combining Theory Generation and Model Checking for Security Protocol Analysis. At: Workshop on Formal Methods in Computer Security, July
7 Abstract. This paper reviews two relatively new tools for automated formal analysis of security protocols. One applies the formal methods technique of model checking to the task of protocol analysis, while the other utilizes the method of theory generation, which borrows from both model checking and automated theorem proving. For purposes of comparison, the tools are both applied to a suite of sample protocols with known flaws, including the protocol used in an earlier study to provide a baseline. We then suggest a heuristic for combining the two approaches to provide a more complete analysis than either approach can provide alone. 8. Nicholas Freitag McPhee and Nicholas J. Hopper. Analysis of genetic diversity through population history. In: GECCO-99: Proceedings of the Genetic and Evolutionary Computation Conference, July Abstract. The idea that diversity in the population of a genetic algorithm affects the algorithm s search efficiency is widely accepted. However, little is known about the amount of node level diversity present in Genetic Programming (GP) runs. In this paper, we introduce several techniques for measuring the diversity of a population based on the genetic history of the individuals. We then apply these measures to the genetic histories of several runs of four different problems. The results of this analysis show that a surprisingly small amount of diversity is present in the final population of a GP run. We conclude by suggesting a variety of other potential applications of these measures. 9. Nicholas Freitag McPhee and Nicholas J. Hopper. AppGP: An alternative structural representation for GP. In: Proceedings of the 1999 Congress on Evolutionary Computation, June Abstract. It has been shown that Standard Genetic Programming using standard subtree crossover is prone to a form of structural convergence which makes it extremely difficult to make changes near the root, occasionally causing runs to become trapped in local maxima. Based on these structural limitations we propose a different tree representation, AppGP, which we hope will avoid this problem in some cases. In this paper, we describe this representation, and compare its performance to the performance of Standard GP on a suite of test problems. We find that on all of the test problems, AppGP does no worse than Standard GP, and in several it does considerably better, suggesting that the representation warrants further study. 10. Nicholas Freitag McPhee, Nicholas J. Hopper and Mitchell L. Reierson, Impact of types on essentially typeless problems in GP. In: Genetic Programming 1998: Proceedings of the Third Annual Conference, July Abstract. Several researchers have shown type systems to be valuable in extending the range of problems (conveniently) addressed by Genetic Programming. There are other possible benefits of type systems, however, that derive from the new kinds of structural representation they make possible, and the effects that this has on the performance of recombination operators like the crossover operator. In this paper we compare the performance of Standard (untyped) Genetic Programming (SGP) and Hindley-Milner (typed) Genetic Programming (HMGP) on a suite of problems where an untyped representation (satisfying the closure property) is quite natural. We find that on several problems HMGP significantly outperforms SGP, while on other problems the performance of SGP and HMGP are essentially the same. We also suggest an intermediate representation that should provide many of the benefits of HMGP on these problems without requiring the complexity of a powerful type system. 7
Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak
Non-Black-Box Techniques In Crytpography Introduction Thesis for the Ph.D degree Boaz Barak A computer program (or equivalently, an algorithm) is a list of symbols a finite string. When we interpret a
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
CAPTCHA: Using Hard AI Problems For Security
CAPTCHA: Using Hard AI Problems For Security Luis von Ahn 1, Manuel Blum 1, Nicholas J. Hopper 1, and John Langford 2 1 Computer Science Dept., Carnegie Mellon University, Pittsburgh PA 15213, USA 2 IBM
Ch.9 Cryptography. The Graduate Center, CUNY.! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis
Ch.9 Cryptography The Graduate Center, CUNY! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis Why is Modern Cryptography part of a Complexity course? Short answer:! Because Modern Cryptography
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic University Outline Administrative Stuff Introductory Technical Stuff Some Pointers Course Web Page http://isis.poly.edu/courses/cs6903-s10
2010 Master of Science Computer Science Department, University of Massachusetts Amherst
Scott Niekum Postdoctoral Research Fellow The Robotics Institute, Carnegie Mellon University Contact Information Smith Hall, Room 228 Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213
Brian Alan Snyder, Ph. D.
Brian Alan Snyder, Ph. D. Current work address Department of Mathematics and Computer Science Work phone: (906) 635-2658 Lake Superior State Home phone: (906) 253-9822 650 West Easterday Ave. Department
1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.
Curriculum Vitae Vassilis Zikas Postdoctoral Researcher, UCLA University of California, Los Angeles Los Angeles, CA 90095-1596 +1 (424) 781-7942 [email protected] www.cs.ucla.edu/~vzikas Education 2006
SFWR ENG 4C03 - Computer Networks & Computer Security
KEY MANAGEMENT SFWR ENG 4C03 - Computer Networks & Computer Security Researcher: Jayesh Patel Student No. 9909040 Revised: April 4, 2005 Introduction Key management deals with the secure generation, distribution,
Lecture 11: The Goldreich-Levin Theorem
COM S 687 Introduction to Cryptography September 28, 2006 Lecture 11: The Goldreich-Levin Theorem Instructor: Rafael Pass Scribe: Krishnaprasad Vikram Hard-Core Bits Definition: A predicate b : {0, 1}
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 [email protected] www.xianruimeng.
Xianrui Meng MCS 138, 111 Cummington Mall Boston, MA 02215 +1 (857) 540 0460 [email protected] www.xianruimeng.org RESEARCH INTERESTS In my research, I investigate practical privacy-preserving solutions
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre Some slides were also taken from Chanathip Namprempre's defense
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
A Simulation Game for Teaching Secure Data Communications Protocols
A Simulation Game for Teaching Secure Data Communications Protocols Leonard G. C. Hamey Department of Computing, Macquarie University, Sydney, Australia ABSTRACT With the widespread commercial use of the
Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing
Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing Yury Lifshits July 10, 2005 Abstract The goal of the paper is to construct mathematical abstractions of different aspects of real
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Software Puzzle Counterstrike for Denial of Service Attack
Software Puzzle Counterstrike for Denial of Service Attack Deepu. S. D, Dr. Ramakrishna. M.V 4th Sem M.Tech Student, Department of ISE, SJBIT, Bangalore, India Professor, Department of ISE, SJBIT, Bangalore,
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
Lecture 15 - Digital Signatures
Lecture 15 - Digital Signatures Boaz Barak March 29, 2010 Reading KL Book Chapter 12. Review Trapdoor permutations - easy to compute, hard to invert, easy to invert with trapdoor. RSA and Rabin signatures.
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
1 Message Authentication
Theoretical Foundations of Cryptography Lecture Georgia Tech, Spring 200 Message Authentication Message Authentication Instructor: Chris Peikert Scribe: Daniel Dadush We start with some simple questions
Advanced Topics in Cryptography and Network Security
Advanced Topics in Cryptography and Network Security Breno de Medeiros Department of Computer Science Florida State University Advanced Topics in Cryptography and Network Security p.1 Class Reference Sheet
QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University
QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)
CSC384 Intro to Artificial Intelligence
CSC384 Intro to Artificial Intelligence What is Artificial Intelligence? What is Intelligence? Are these Intelligent? CSC384, University of Toronto 3 What is Intelligence? Webster says: The capacity to
Security in Electronic Payment Systems
Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Nicholas Beauchamp. Assistant Professor Department of Political Science Northeastern University 301 Meserve Hall Boston, MA 02115, USA
Nicholas Beauchamp Assistant Professor Department of Political Science Northeastern University 301 Meserve Hall Boston, MA 02115, USA Tel: +1 678 662 1412 Email: [email protected] Web: nickbeauchamp.com
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
Information Security and Cryptography
Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00
Yevgeny Goncharov WORK EXPERIENCE
Yevgeny Goncharov Quantitative Risk Management 181 West Madison Street 41 st Floor Chicago, Illinois 60602 Phone: (312) 782-7716 [email protected] WORK EXPERIENCE Academic Background 1998 2003
The Harvey Mudd Guide to Graduate School in Computer Science
The Harvey Mudd Guide to Graduate School in Computer Science 1 Introduction This guide is intended for Harvey Mudd students who are considering graduate school in computer science. The guide is intended
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
UF EDGE brings the classroom to you with online, worldwide course delivery!
What is the University of Florida EDGE Program? EDGE enables engineering professional, military members, and students worldwide to participate in courses, certificates, and degree programs from the UF
A Secure and Efficient Conference Key Distribution System
********************** COVER PAGE ********************** A Secure and Efficient Conference Key Distribution System (Extended Abstract) Mike Burmester Department of Mathematics Royal Holloway University
A Survey on Optimistic Fair Digital Signature Exchange Protocols
A Survey on Optimistic Fair Digital Signature Exchange s Alfin Abraham Vinodh Ewards Harlay Maria Mathew Abstract Security services become crucial to many applications such as e-commerce payment protocols,
Rashad Moarref 1/5. Rashad Moarref. Postdoctoral Scholar in Aerospace Graduate Aerospace Laboratories Phone: (626) 395 4459
Rashad Moarref 1/5 Rashad Moarref Postdoctoral Scholar in Aerospace Graduate Aerospace Laboratories Phone: (626) 395 4459 California Institute of Technology E-mail: [email protected] 1200 E California
Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography
Anca Nitulescu PhD Student Personal information Address: Ecole Normale Supérieure, DI Paris, France Email: [email protected] Occupational field Cryptography: Provable Security for Protocols I have
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
1 Signatures vs. MACs
CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Nov. 22, 2006 Lecture Notes 17: Digital Signatures Recommended Reading. Katz-Lindell 10 1 Signatures vs. MACs Digital signatures
Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads
CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs
A Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer. Yale University. S. Micali Massachusetts Institute of Technology
J, Cryptoiogy (1996) 9:191-195 Joumol of CRYPTOLOGY O 1996 International Association for Cryptologic Research A Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer Yale University
Lecture 6 - Cryptography
Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about
Efficient Unlinkable Secret Handshakes for Anonymous Communications
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique
Invited Conference Talk (20m), A Comparison of Heuristics for Solving Problems in Approximate
John P. May Department of Computer and Information Sciences University of Delaware, Newark, DE 1-302-831-1957 (work), 1-410-810-1825 (home) [email protected] http://www.cis.udel.edu/ jpmay/ Born: August 5th,
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Lecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
How To Protect Your Data From Attack
Security in Communication Networks Lehrstuhl für Informatik 4 RWTH Aachen Prof. Dr. Otto Spaniol Dr. rer. nat. Dirk Thißen Page 1 Organization Lehrstuhl für Informatik 4 Lecture Lecture takes place on
Youxu (Tammy) Tjader
Youxu (Tammy) Tjader 282 Mervis Hall The Joseph M. Katz Graduate School of Business University of Pittsburgh Pittsburgh, PA 15260 Fax: (412) 624-3633 9123 Willoughby Rd Pittsburgh PA 15237 Home: (412)
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
SUBLIMINALFREE AUTHENTICATION AND SIGNATURE
SUBLIMINALFREE AUTHENTICATION AND SIGNATURE (Extended Abstract) Yvo Desmedt Dept. EE & CS, Univ. of Wisconsin - Milwaukee P.O. Box 784, WI 53201 Milwaukee, U.S.A. ABSTRACT Simmons [17] introduced the notion
Juliana V. Belding Department of Mathematics The University of Maryland College Park, MD 20742 [email protected] www.math.umd.
Juliana V. Belding Department of Mathematics The University of Maryland College Park, MD 20742 [email protected] www.math.umd.edu/ jbelding EDUCATION Ph.D. in Mathematics, May 2008 (expected) University
Practical Internet Steganography: Data Hiding in IP
Practical Internet Steganography: Data Hiding in IP Deepa Kundur Texas A&M University, College Station Department of Electrical Engineering 3128 TAMU, College Station Texas, USA 77843-3128 [email protected]
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Working Papers Abraham, M. Abraham, M. Abraham, M. Abraham, M. Abraham, M., Refereed Presentations Abraham, M. Abraham, M. Abraham, M. Abraham, M.
MABEL ABRAHAM [email protected] 401.742.4756 100 Main Street, E62-367 mabelabraham.com Updated November 2014 EDUCATION 2015, PhD, Management (expected) Dissertation: Understanding the role of evaluators for
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Yale University Department of Computer Science
Yale University Department of Computer Science On Backtracking Resistance in Pseudorandom Bit Generation (preliminary version) Michael J. Fischer Michael S. Paterson Ewa Syta YALEU/DCS/TR-1466 October
Data Privacy and Biomedicine Syllabus - Page 1 of 6
Data Privacy and Biomedicine Syllabus - Page 1 of 6 Course: Data Privacy in Biomedicine (BMIF-380 / CS-396) Instructor: Bradley Malin, Ph.D. ([email protected]) Semester: Spring 2015 Time: Mondays
Lecture 17: Re-encryption
600.641 Special Topics in Theoretical Cryptography April 2, 2007 Instructor: Susan Hohenberger Lecture 17: Re-encryption Scribe: Zachary Scott Today s lecture was given by Matt Green. 1 Motivation Proxy
How To Teach Economics
YONG CHAO College of Business Phone: (626) 230-5198 University of Louisville E-mail: [email protected] Louisville, Kentucky 40292 Web: http://yongchao.us ACADEMIA APPOINTMENT 2010 ~ Present Assistant
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
MEHMET AKTAS. Graduate Teaching Assistant - Course Instructor
MEHMET AKTAS Department of Mathematics Phone: 850-339-6130 Florida State University Email: [email protected] 32306 EDUCATION Florida State University, Tallahassee, Florida (expected) August 2016 Ph.D.,
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
RICHARD KEVIN MAXWELL
RICHARD KEVIN MAXWELL EDUCATION Waynesburg College, Waynesburg, Pennsylvania Secondary Teacher Certification Program, August 1997 - May 1998 Student Teaching: West Greene Senior High School, Rogersville,
How to Protect Peer-to-Peer Online Games from Cheats
How to Protect Peer-to-Peer Online Games from Cheats Haruhiro Yoshimoto Rie Shigetomi Hideki Imai University of Tokyo Imai Laboratory, Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba,
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
EDUCATION. UNIVERSITY OF TORONTO, Department of History
BRIAN BEATON Assistant Professor School of Information Sciences University of Pittsburgh 622 Information Science Building 135 North Bellefield Avenue Pittsburgh, PA 15260 United States EDUCATION Ph.D.,
WHITE PAPER www.tresorit.com
WHITE PAPER tresor [tʀeˈzoːɐ ] noun (German) 1. lockable, armoured cabinet THE CLOUD IS UNTRUSTED The cloud has huge potential when it comes to storing, sharing and exchanging files, but the security provided
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
A Novel Approach for Signing Multiple Messages: Hash- Based Signature
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. International Research Publications House http://www. irphouse.com A Novel Approach for Signing
Software Engineering and Service Design: courses in ITMO University
Software Engineering and Service Design: courses in ITMO University Igor Buzhinsky [email protected] Computer Technologies Department Department of Computer Science and Information Systems December
Teaching large lecture classes online: Reflections on engaging 200 students on Blackboard and Facebook
Teaching large lecture classes online: Reflections on engaging 200 students on Blackboard and Facebook By Marcus Messner, Ph.D. Assistant Professor, VCU School of Mass Communications VCU Online Learning
MACs Message authentication and integrity. Table of contents
MACs Message authentication and integrity Foundations of Cryptography Computer Science Department Wellesley College Table of contents Introduction MACs Constructing Secure MACs Secure communication and
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP) Contents...1 Abstract...2 Introduction...3 The importance of the cryptography...4 The idea about how (PGP) works...5 Legal issues surrounding (PGP)...6 The implementation and
Message Authentication Code
Message Authentication Code Ali El Kaafarani Mathematical Institute Oxford University 1 of 44 Outline 1 CBC-MAC 2 Authenticated Encryption 3 Padding Oracle Attacks 4 Information Theoretic MACs 2 of 44
