Technical Perspective: Attacking Cryptographic Key Exchange with Precomputation
"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice," by David Adrian et al., illustrates the importance of taking preprocessing attacks into…
Technical Perspective: Attacking Cryptographic Key Exchange with Precomputation
Neuroscience Meets Cryptography: Crypto Primitives Secure Against Rubber Hose Attacks
Functional Encryption: A New Vision For Public-Key Cryptography
The Emergence of Cross Channel Scripting
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved