Active
Recent
Comments
Search
Login
Login
crypto.stanford.edu: 14 stories from 15 submitters
2
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics (2017)
☶
pdf
cryptography
privacy
crypto.stanford.edu
via
ignaloidas
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
18
Get a Life
haskell
crypto.stanford.edu
via
aleph
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
The PwdHash Browser Extension
security
web
crypto.stanford.edu
via
mooreds
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Linking Anonymous Transactions via Remote Side-Channel Attacks
security
crypto.stanford.edu
via
eloy
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
APL and J vs C
apl
programming
crypto.stanford.edu
via
akkartik
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
A Graduate Course in Applied Cryptography
cryptography
education
crypto.stanford.edu
via
quobit
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Bulletproofs: Short Proofs for Confidential Transactions
cryptography
merkle-trees
crypto.stanford.edu
via
sanxiyn
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
A Combinatory Compiler
compilers
compsci
crypto.stanford.edu
via
pushcx
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Order-Revealing Encryption
cryptography
crypto.stanford.edu
via
ajisaiko
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Mobile Sensors Exploitation
mobile
security
crypto.stanford.edu
via
bratsche
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
PowerSpy: Location Tracking Using Mobile Device Power Analysis
android
security
crypto.stanford.edu
via
noelle
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
12
A Graduate Course in Applied Cryptography
pdf
security
crypto.stanford.edu
via
inactive-user
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
1
Recognizing Speech From Gyroscope Signals
pdf
android
privacy
security
crypto.stanford.edu
via
davyjones
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Twenty years of attacks on the RSA cryptosystem (1999)
security
crypto.stanford.edu
via
RiderOfGiraffes
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1