publié le: March 2012
We introduce return-oriented programming, a technique by which an attacker can induce arbitrary behavior in a program whose control flow he has diver...
We narrow the gap between concrete implementations of cryptographic protocols and their verified models. We develop and verify a small functional imp...
publié le: March 2012.
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting...
We analyze information leaks in the lookup mechanisms of structured peer-to-peer (P2P) anonymous communication systems and how these leaks can be use...
publié le: May 2011
The use of privacy-enhancing cryptographic protocols, such as anonymous credentials and oblivious transfer, could have a detrimental effect on the ab...