Publication Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and their Implementation on GLV-GLS Curves (Extended Version) Armando Faz-Hernandez, Patrick Longa, Ana Sanchez Journal of Cryptographic Engineering | September 2014
Publication On the revocation of U-Prove tokens Christian Paquin MSR-TR-2014-122 | September 2014 Project
Publication Accelerating NTRU Based Homomorphic Encryption Using GPUs Wei Dai, Yarkın Doröz, Berk Sunar 2014 IEEE High Performance Extreme Computing Conference (HPEC) | September 2014
Publication Zero-Effort Payments: Design, Deployment, and Lessons Christopher Smowton, Jay Lorch, David Molnar, Stefan Saroiu, Alec Wolman Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp) | September 2014 Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp) Project
Publication XRay: Increasing the Web’s Transparency with Differential Correlation Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Chaintreau, Roxana Geambasu USENIX Security’14 | August 2014
Publication Towards reliable storage of 56-bit secrets in human memory Joseph Bonneau, Stuart Schechter Proceedings of the 23rd USENIX Security Symposium | August 2014 Proceedings of the 23rd USENIX Security Symposium
Publication Towards reliable storage of 56-bit secrets in human memory (extended version) Joseph Bonneau, Stuart Schechter MSR-TR-2014-95 | August 2014
Publication Telepathwords: Preventing Weak Passwords by Reading Users’ Minds Saranga Komanduri, Rich Shay, Lorrie Cranor, Cormac Herley, Stuart Schechter Proceedings of the 23rd USENIX Security Symposium | August 2014
Publication Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff Lecture Notes in Computer Science | August 2014