enter search term and/or author name
A Large-Scale Evaluation of High-Impact Password Strength Meters
Xavier De Carné De Carnavalet, Mohammad Mannan
Article No.: 1
Passwords are ubiquitous in our daily digital lives. They protect various types of assets ranging from a simple account on an online newspaper website to our health information on government websites. However, due to the inherent value they...
Bitcoin is a decentralized payment system that relies on Proof-of-Work (PoW) to resist double-spending through a distributed timestamping service. To ensure the operation and security of Bitcoin, it is essential that all transactions and their...
The Prêt à Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this article, we present our development of the Prêt à Voter design to a practical...
CacheAudit: A Tool for the Static Analysis of Cache Side Channels
Goran Doychev, Boris Köpf, Laurent Mauborgne, Jan Reineke
Article No.: 4
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channels. CacheAudit takes as input a program binary and a cache configuration and derives formal, quantitative security guarantees for a comprehensive...