* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Sunday, March 22, 2026
Earth-News
  • Home
  • Business
  • Entertainment

    Uncover the Top 10 Most Played Songs from the ‘Love Story’ Soundtrack on Spotify

    Beloved Actress and Comedian Opens Up with Inspiring Health Update After Relapse

    Australia’s Star Entertainment Appoints New Group CFO in Bold Leadership Shift

    How Sphere Entertainment’s Tech-Savvy Legal Chief Is Silently Revolutionizing Its Strategic Advantage

    Dolphin Entertainment (DLPN) CEO Keeps Buying Shares of the Company’s Stock – Yahoo Finance

    Foxboro Greenlights Entertainment License for Exciting World Cup Matches at Gillette Stadium

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology

    Three Men Charged with Plotting to Smuggle US Artificial Intelligence Technology to China

    Everywoman announces 2026 Women in Technology Awards winners – Computer Weekly

    Revolutionizing Canadian Health Tech: Accelerating Innovation to Enhance Patient Care

    Beavers Transform Riverbeds into Mighty Carbon-Capturing Ecosystems

    Figure Technology Solutions and Agora Data Join Forces to Transform Auto Loans with Cutting-Edge Blockchain Platform

    Unlocking the Future of Poultry Feed: Innovations, Automation Trends, and Market Forecasts Through 2033

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment

    Uncover the Top 10 Most Played Songs from the ‘Love Story’ Soundtrack on Spotify

    Beloved Actress and Comedian Opens Up with Inspiring Health Update After Relapse

    Australia’s Star Entertainment Appoints New Group CFO in Bold Leadership Shift

    How Sphere Entertainment’s Tech-Savvy Legal Chief Is Silently Revolutionizing Its Strategic Advantage

    Dolphin Entertainment (DLPN) CEO Keeps Buying Shares of the Company’s Stock – Yahoo Finance

    Foxboro Greenlights Entertainment License for Exciting World Cup Matches at Gillette Stadium

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology

    Three Men Charged with Plotting to Smuggle US Artificial Intelligence Technology to China

    Everywoman announces 2026 Women in Technology Awards winners – Computer Weekly

    Revolutionizing Canadian Health Tech: Accelerating Innovation to Enhance Patient Care

    Beavers Transform Riverbeds into Mighty Carbon-Capturing Ecosystems

    Figure Technology Solutions and Agora Data Join Forces to Transform Auto Loans with Cutting-Edge Blockchain Platform

    Unlocking the Future of Poultry Feed: Innovations, Automation Trends, and Market Forecasts Through 2033

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Technology

Protecting Secrets from Computers (2023)

January 30, 2024
in Technology
Protecting Secrets from Computers (2023)
Share on FacebookShare on Twitter

ACM Digital Library

Skip Abstract Section

Abstract

Bob is in prison and Alice is dead; they trusted computers with secrets. Review time-tested tricks that can help you avoid the grim fate of the old crypto couple.

Ball, J., Borger, J., and Greenwald, G. 2013. Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security.Google ScholarGoogle ScholarBarak, B. 2021. An Intensive Introduction to Cryptography. https://intensecrypto.org/public/index.html and https://files.boazbarak.org/crypto/lnotes_book.pdf.Google ScholarGoogle ScholarBauer, F.L. 2000. Decrypted Secrets. Springer, second edition. ISBN 3-540-66871-3. See p. 26 regarding print newspapers.Google ScholarGoogle ScholarBerghel, H. 2019. Vehicle telematics: The good, bad and ugly. IEEE Computer, 52(1):66?70. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8666649.Google ScholarGoogle ScholarDigital LibraryDigital LibraryJeff Bezos phone hacking incident. 2023. https://en.wikipedia.org/wiki/Jeff_Bezos_phone_hacking_incident.Google ScholarGoogle ScholarBoneh, D. and Shoup, V. 2023. A Graduate Course in Applied Cryptography. https://toc.cryptobook.us/book.pdf.Google ScholarGoogle ScholarBrandom, R. 2016. Why can’t Apple spend its way out of security vulnerabilities? The Verge. https://www.theverge.com/2016/8/26/12660800/apple-ios-security-bug-bounty-payouts.Google ScholarGoogle ScholarCaesar, Ed. 2023. Crooks’ Mistaken Bet on Encrypted Phones. The New Yorker, 32?43, April 17, 2023. https://www.newyorker.com/magazine/2023/04/24/crooks-mistaken-bet-on-encrypted-phones.Google ScholarGoogle ScholarChaum, D. 1988. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1(1):65?75. HTML version available at http://www.cs.cornell.edu/People/egs/herbivore/dcnets.html.Google ScholarGoogle ScholarCross RefCross RefCheck digit. 2023. https://en.wikipedia.org/wiki/Check_digit.Google ScholarGoogle ScholarDewdney, A. K. 1984. On the spaghetti computer and other analog gadgets for problem solving. Scientific American, 250(6):19?26. The basics are explained at http://dataphys.org/list/dewdneys-analog-gadgets/.Google ScholarGoogle ScholarDozier, K. and Yost, P. 2012. Petraeus shocked to hear of emails, associates say. Associated Press. https://web.archive.org/web/20121113030944/http://m.apnews.com/ap/db_289563/contentdetail.htm?contentguid=VOlvNjF4.Google ScholarGoogle ScholarEdwards, J. 2014. Emails Show Apple’s Steve Jobs and Google’s Eric Schmidt Allegedly Conspired to Screw Over Employees. Business Insider. https://www.businessinsider.com/apple-google-recruitment-emails-lawsuit-2014-1.Google ScholarGoogle ScholarBrennan Center for Justice. Securing the nation’s voting machines: A toolkit for advocates and election officials, June 2018. https://www.brennancenter.org/sites/default/files/2019-08/Report_Securing__Voting_Machines.pdf.Google ScholarGoogle ScholarGoodin, D. 2023. The Spy Who Hacked Me: ?Clickless? iOS exploits infect Kaspersky iPhones with never-before-seen malware; ?Operation Triangulation? stole mic recordings, photos, geolocation, and more. https://arstechnica.com/information-technology/2023/06/clickless-ios-exploits-infect-kaspersky-iphones-with-never-before-seen-malware/.Google ScholarGoogle ScholarGreenwald, G. 2014. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York, NY: Metropolitan Books. ISBN 978-1-62779-073-4.Google ScholarGoogle ScholarDigital LibraryDigital LibraryHarris, M. 2023. The Panopticon v. the Capitol Rioters. IEEE Spectrum, 60(2):32?37, 46. https://ieeexplore.ieee.org/document/10040551/.Google ScholarGoogle ScholarCross RefCross RefLehrer, T. 2000. ?Werner von Braun.? Originally from That Was the Year That Was (1965). Also available on The Remains of Tom Lehrer, Warner Bros. https://genius.com/Tom-lehrer-wernher-von-braun-lyrics and https://www.youtube.com/watch?v=QEJ9HrZq7Ro.Google ScholarGoogle ScholarLiptak, K. 2015. U.S. government hacked; feds think China is the culprit. Cable News Network. http://www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/.Google ScholarGoogle ScholarModulo bias. 2023. https://en.wikipedia.org/wiki/Fisher%E2%80%93Yates_shuffle#Modulo_bias.Google ScholarGoogle ScholarNaor, M., Naor, Y., and Reingold, O. 1999. Applied kid cryptography ?or? how to convince your children you are not cheating. Paper: https://www.wisdom.weizmann.ac.il/~naor/PAPERS/waldo_abs.html. Talk: https://www.youtube.com/watch?v=L3AmP6IQLtg.Google ScholarGoogle ScholarNaor, M. and Shamir, A., 1994. Visual cryptography. In Proceedings of EUROCRYPT, volume 950 of Lecture Notes in Computer Science, 1?12. New York, NY: Springer. doi:10.1007/BFb0053419. https://www.cs.jhu.edu/~fabian/courses/CS600.624/NaorShamir-VisualCryptography.pdfGoogle ScholarGoogle ScholarNumbers stations. 2023. https://en.wikipedia.org/wiki/Numbers_stations.Google ScholarGoogle ScholarOnion News Network. 2011. CIA’s ?Facebook? program dramatically cut agency’s costs. https://www.theonion.com/cias-facebook-program-dramatically-cut-agencys-costs-1819594988 and https://www.youtube.com/watch?v=ZJ380SHZvYU.Google ScholarGoogle ScholarPegasus (spyware). 2023. https://en.wikipedia.org/wiki/Pegasus_(spyware).Google ScholarGoogle ScholarDavid Petraeus. 2023. https://en.wikipedia.org/wiki/David_Petraeus.Google ScholarGoogle ScholarRandom dot stereogram. 2023. https://en.wikipedia.org/wiki/Random_dot_stereogram.Google ScholarGoogle ScholarRogaway, P. 2016. The moral character of cryptographic work. https://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf. Based on an Asiacrypt 2015 talk.Google ScholarGoogle ScholarSanders, S. 2015. Massive data breach puts 4 million federal employees’ records at risk. National Public Radio. https://www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk.Google ScholarGoogle ScholarSchneier, B. 1999. The Solitaire Encryption Algorithm. https://www.schneier.com/academic/solitaire/. See also http://www.ciphergoth.org/crypto/solitaire/.Google ScholarGoogle ScholarSchneier, B. 2015. Applied Cryptography. Hoboken, NJ: Wiley, 20th anniversary edition. ISBN 978-1-119-096726. See Afterword by Matt Blaze for NSA quote and p. 228 for cover-message trick.Google ScholarGoogle ScholarShamir, A. 1979. How to share a secret. Communications of the ACM 22(11):612?613. https://dl.acm.org/doi/10.1145/359168.359176.Google ScholarGoogle ScholarSimons, B. 2006. Statement of Barbara Simons for the Committee on House Administration Hearing on Electronic Voting Machines. https://www.acm.org/binaries/content/assets/public-policy/usacm/e-voting/testimony/simons_testimony.pdf.Google ScholarGoogle ScholarThe Deadly Years (Star Trek episode). 2023. https://en.wikipedia.org/wiki/The_Deadly_Years.Google ScholarGoogle ScholarThompson, K. 1984. Reflections on trusting trust [Turing Award lecture]. Communications of the ACM 27(8). https://dl.acm.org/doi/pdf/10.1145/358198.358210.Google ScholarGoogle ScholarThe New York Times. 2013. Secret documents reveal N.S.A. campaign against encryption. https://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html.Google ScholarGoogle ScholarZuboff, S. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. New York, NY: Public Affairs. ISBN 978-1-5417-5800-1.Google ScholarGoogle Scholar

Recommendations

An extensive review on quantum computers

Highlights

Quantum Error Correction (QEC) secured quantum data from decoherence and quantum noise.

Abstract

Quantum Computing is a rapidly arising innovation that tackles the laws of quantum mechanics to take care of issues excessively complex for already available classical computers. The development of quantum computers is the most …

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

InformationContributors

Published in

cover image Queue

Queue  Volume 21, Issue 4

Confidential Computing

July/August 2023

118 pages

Copyright © 2023 ACM

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 September 2023

Check for updates

Check for updates on crossmark

Qualifiers

columnOpinionEditor picked

Conference

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : Hacker News – https://dl.acm.org/doi/10.1145/3623614

Tags: ProtectingSecretstechnology
Previous Post

Dracula Theme for Hacker News

Next Post

When did cold, carbonated beer become the standard, and was there pushback?

China Strengthens Nuclear Commitment, Advances Energy Strategy, and Launches Innovative Ecological Code

March 21, 2026

Breakthrough Single-Atom Catalyst Turns CO2 into Clean, Sustainable Fuel

March 21, 2026

Discover the Excitement of Pop-Up Science with Minecraft Rocks!

March 21, 2026

Superformance Transforms Lifestyle Brand with a Revolutionary Digital Experience

March 21, 2026

Pirovano Dominates World Cup Downhill While Aicher Closes in on Shiffrin

March 21, 2026

Trump Ally Sounds Alarm: US Economy Far Weaker Than Expected

March 21, 2026

Uncover the Top 10 Most Played Songs from the ‘Love Story’ Soundtrack on Spotify

March 21, 2026

Shaping the Future of Responsible AI in Mental Health and Well-Being: Insights from Leading Experts

March 21, 2026

Congress Pushes for Clear Exit Strategy Amid Escalating Tensions with Iran

March 21, 2026

Unlocking Hidden IP Goldmines: Strategic Intellectual Property Insights for Artificial Intelligence in Non-Tech Companies

March 21, 2026

Categories

Archives

March 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Feb    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (1,130)
  • Economy (1,148)
  • Entertainment (22,024)
  • General (20,538)
  • Health (10,186)
  • Lifestyle (1,162)
  • News (22,149)
  • People (1,150)
  • Politics (1,166)
  • Science (16,363)
  • Sports (21,649)
  • Technology (16,130)
  • World (1,141)

Recent News

China Strengthens Nuclear Commitment, Advances Energy Strategy, and Launches Innovative Ecological Code

March 21, 2026

Breakthrough Single-Atom Catalyst Turns CO2 into Clean, Sustainable Fuel

March 21, 2026
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version