Before computers, military tacticians and government agents had to rely on pencil-and-paper methods to encrypt information. For agents that want to use low-tech options in order to minimize their digital footprint, non-computerized ciphers are an essential component of their toolbox. Still, the presence of computers limits the pool of effective hand ciphers. If a cipher is not unpredictable enough, then a computer will easily be able to break it. There are 52! ≈ 2^225.58 ways to mix a deck of cards. If each deck order is a key, this means that there are 52! ≈ 2^225.58 different ways to encrypt a given message. To create some perspective, most computer ciphers feature either 2^128 or 2^256 different ways of encrypting the same message. Hence...
While many cryptographic protocols for card games have been proposed, all of them focus on card game...
We live in an age where we willingly provide our social security number, credit card information, ho...
We examine some historical proto-mechanical cryptographic devices, such as the Wheatstone Cryptograp...
Throughout history, spies, soldiers, and others have relied on so-called {\em hand ciphers} to send ...
AbstractA deck of cards can be used as a cryptographic tool (Advances in cryptology : CRYPTO’93, Lec...
Secure multiparty computation can be done with a deck of playing cards. For example, den Boer (EUROC...
Card-based cryptography, as first proposed by den Boer [den Boer, 1989], enables secure multiparty c...
Card-based cryptography, as first proposed by den Boer (EUROCRYPT 1989), enables secure multiparty c...
The elegant “five-card trick” of den Boer (EUROCRYPT 1989) allows two players to securely compute a ...
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Pattern-loaded ciphers are at risk of being compromised by exploiting deeper patterns discovered fir...
International audienceTrick-taking games are traditional card games played all over the world. There...
Card-based protocols allow to evaluate an arbitrary fixed Boolean function on a hidden input to obt...
Card-based cryptography provides simple and practicable protocols for performing secure multi-party ...
While many cryptographic protocols for card games have been proposed, all of them focus on card game...
We live in an age where we willingly provide our social security number, credit card information, ho...
We examine some historical proto-mechanical cryptographic devices, such as the Wheatstone Cryptograp...
Throughout history, spies, soldiers, and others have relied on so-called {\em hand ciphers} to send ...
AbstractA deck of cards can be used as a cryptographic tool (Advances in cryptology : CRYPTO’93, Lec...
Secure multiparty computation can be done with a deck of playing cards. For example, den Boer (EUROC...
Card-based cryptography, as first proposed by den Boer [den Boer, 1989], enables secure multiparty c...
Card-based cryptography, as first proposed by den Boer (EUROCRYPT 1989), enables secure multiparty c...
The elegant “five-card trick” of den Boer (EUROCRYPT 1989) allows two players to securely compute a ...
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Pattern-loaded ciphers are at risk of being compromised by exploiting deeper patterns discovered fir...
International audienceTrick-taking games are traditional card games played all over the world. There...
Card-based protocols allow to evaluate an arbitrary fixed Boolean function on a hidden input to obt...
Card-based cryptography provides simple and practicable protocols for performing secure multi-party ...
While many cryptographic protocols for card games have been proposed, all of them focus on card game...
We live in an age where we willingly provide our social security number, credit card information, ho...
We examine some historical proto-mechanical cryptographic devices, such as the Wheatstone Cryptograp...