This thesis addresses the question what cryptography can do for one personally, i.e., it looks at security and privacy challenges of individuals in today's world. In particular, this thesis solves a number of real-world problems, including secure handling of passwords used for authentication and how to extend digital signature schemes to allow for additional features. The presented protocols are provably secure under realistic assumptions, while providing state-of-the-art security and privacy guarantees. All proposed protocols are highly efficient, useful, yet deployable on a large scale, i.e., they are truly practical, thus bridging the gap between theory and practice. This is demonstrated by providing performance evaluations and estimates...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Currently, people have a limited range of choices in managing their identity online. They can use th...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
For the past three decades, a wide variety of cryptographic protocols have been proposed to solve se...
In traditional public key cryptography, public keys of users are essentially random strings generate...
An important shortcoming of client-side cryptography on consumer devices is the poor protection of s...
International audienceDigital signatures are perhaps the most important base for authentication and ...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Cryptography is used to protect data and communications. The basic tools are cryptographic primitiv...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
Cryptography is science of secure message transmission. Cryptanalysis is involved with breaking thes...
Individuals are encouraged to prove their eligibility to access specific services regularly. However...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Currently, people have a limited range of choices in managing their identity online. They can use th...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
For the past three decades, a wide variety of cryptographic protocols have been proposed to solve se...
In traditional public key cryptography, public keys of users are essentially random strings generate...
An important shortcoming of client-side cryptography on consumer devices is the poor protection of s...
International audienceDigital signatures are perhaps the most important base for authentication and ...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Cryptography is used to protect data and communications. The basic tools are cryptographic primitiv...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
Cryptography is science of secure message transmission. Cryptanalysis is involved with breaking thes...
Individuals are encouraged to prove their eligibility to access specific services regularly. However...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Currently, people have a limited range of choices in managing their identity online. They can use th...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...