6 posts tagged with cryptography by jeffburdges.
Displaying 1 through 6 of 6.

No cutesy adversaries

“I think the post-war turn towards social responsibility in science and engineering was less a turn than a sideways glance. .. If researchers like us were actually supposed to know or care about this stuff in any operationally significant way, well, I think we didn't get the memo.   So let me retransmit it. - Phillip Rogaway. The Moral Character of Cryptographic Work. [more inside]
posted by jeffburdges on Dec 6, 2015 - 19 comments

Operation Vula

How the ANC sent encrypted messages to one another during the struggle against apartheid. Talking to Vula is a series of six articles by Tim Jenkins about the project from the ANC`s monthly journal Mayibuye from May 1995 to October 1995. (via Schneier) [more inside]
posted by jeffburdges on Jul 29, 2015 - 14 comments


TorChat is an instant messaging protocol based upon Tor hidden services, making it perhaps the only instant messaging protocol with any substantive resistance to traffic analysis. [more inside]
posted by jeffburdges on Jun 18, 2012 - 19 comments

Your LinkedIn Password

LinkedIn has spilled 6.5 million unsalted SHA-1 password hashes. [more inside]
posted by jeffburdges on Jun 6, 2012 - 266 comments

Encrypted database queries

CryptDB executes database queries over encrypted data without ever decrypting it. [more inside]
posted by jeffburdges on Dec 20, 2011 - 37 comments

Homomorphic Encryption

Described as 'cryptography's holy grail', Homomorphic Encryption/Computation is a form of encryption where specific algebraic operations on the plaintext translate into different algebraic operations on the ciphertext, allowing the plaintext's owner to 'outsource' computations to untrusted machines. [more inside]
posted by jeffburdges on Aug 9, 2011 - 17 comments

Page: 1