Skip to contents

  1. Edwards, Scott [Editor]; Gasakis, Mele [Editor]; Weber, Michael [Editor] ; Books on Demand GmbH Norderstedt

    Communicating like dolphins with Spot-On encryption suite: democratization of multiple & exponential encryption : Handbook and user manual as practical software guide with introductions into Cryptography, Cryptographic Calling and Cryptographic Discovery, P2P Networking, Graph-Theory, NTRU, McEliece, the Echo Protocol and the Spot-On Software.

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Norderstedt: BoD – Books on Demand, 2019

  2. Gasakis, Mele [Author]; Schmidt, Max [Author] ; Books on Demand GmbH Norderstedt

    Beyond cryptographic routing : the Echo Protocol in the new Era of Exponential Encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to Peer-to-Peer-Flooding-Networks like the Echo respective to Friend-to-Friend Trust-Networks like they are built over the POPTASTIC protocol

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Norderstedt: BoD - Books on Demand, 2018

  3. Henecka, Wilko [Author]; Kögl, Stefan [Author]; Sadeghi, Ahmad-Reza [Author]; Schneider, Thomas [Author]; Wehrenberg, Immo [Author]; Al-Shaer, Ehab S. [Author]; Keromytis, Angelos [Author]; Shmatikov, Vitaly [Author]

    TASTY: Tool for automating secure two-partY computations

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    2010-01-01

    Published in: CCS '10 : Proceedings of the 17th ACM Conference on Computer and Communications Security : October 4-8, 2010, Chicago, Illinois, USA

  4. Cohen, Ran [Author]; Coretti, Sandro [Author]; Garay, Juan [Author]; Zikas, Vassilis [Author] ; Ran Cohen and Sandro Coretti and Juan Garay and Vassilis Zikas [Contributor]

    Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2017