Protecting Secrets from Computers
Skip Abstract SectionAbstractBob is in prison and Alice is dead; they trusted computers with secrets. Review time-tested tricks that can help you avoid the grim fate of the old crypto couple.
References
Ball, J., Borger, J., and Greenwald, G. 2013. Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security.Google ScholarBarak, B. 2021. An Intensive Introduction to Cryptography. https://...
Read more at dl.acm.org