* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Wednesday, October 22, 2025
Earth-News
  • Home
  • Business
  • Entertainment
    Sacramento city leaders approve adding 2 entertainment zones in midtown – CBS News

    Sacramento City Leaders Approve Two Thrilling New Entertainment Zones in Midtown

    AMC brings first new Dolby Experience to Gwinnett since 2017 – Wyoming News Now

    AMC Launches First New Dolby Experience in Gwinnett Since 2017

    Hetzel Design: blending architecture and entertainment – Blooloop

    Hetzel Design: Where Architecture and Entertainment Unite in Perfect Harmony

    Country music legend rushed to hospital year after heart surgery. Here’s what we know – PennLive.com

    Country Music Legend Rushed to Hospital One Year After Heart Surgery – What’s Happening Now?

    Strictly Come Dancing results: Chris Robshaw is eliminated while drag queen La Voix escapes dance-off – Yahoo

    Strictly Come Dancing results: Chris Robshaw is eliminated while drag queen La Voix escapes dance-off – Yahoo

    Placer County town of Loomis considers entertainment zone for downtown – CBS News

    Loomis Unveils Thrilling New Entertainment Zone to Revitalize Downtown

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Rydberg Technologies Inc. Announces Launch of Rydberg Photonics in Berlin – The Quantum Insider

    Rydberg Technologies Launches Exciting New Photonics Division in Berlin

    A look into new technology at Columbia University that could help prevent a dangerous pregnancy complication – ABC7 New York

    A look into new technology at Columbia University that could help prevent a dangerous pregnancy complication – ABC7 New York

    Office Technology: Dealers’ Managed IT Revenue up Nearly 30% – The Cannata Report –

    Office Technology: Dealers’ Managed IT Revenue up Nearly 30% – The Cannata Report –

    3 E Network Technology Group Limited Closes $1.5 Million Convertible Promissory Note Offering – Quiver Quantitative

    3 E Network Technology Group Limited Closes $1.5 Million Convertible Promissory Note Offering – Quiver Quantitative

    3 Technology Stocks to Buy Now – Yahoo Finance

    3 Must-Buy Tech Stocks You Can’t Afford to Miss Right Now

    ‘New frontier’: Austin leaders start discussions on air taxi technology – KXAN Austin

    Austin Leaders Ignite Exciting Conversations on the Future of Air Taxi Technology

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    Sacramento city leaders approve adding 2 entertainment zones in midtown – CBS News

    Sacramento City Leaders Approve Two Thrilling New Entertainment Zones in Midtown

    AMC brings first new Dolby Experience to Gwinnett since 2017 – Wyoming News Now

    AMC Launches First New Dolby Experience in Gwinnett Since 2017

    Hetzel Design: blending architecture and entertainment – Blooloop

    Hetzel Design: Where Architecture and Entertainment Unite in Perfect Harmony

    Country music legend rushed to hospital year after heart surgery. Here’s what we know – PennLive.com

    Country Music Legend Rushed to Hospital One Year After Heart Surgery – What’s Happening Now?

    Strictly Come Dancing results: Chris Robshaw is eliminated while drag queen La Voix escapes dance-off – Yahoo

    Strictly Come Dancing results: Chris Robshaw is eliminated while drag queen La Voix escapes dance-off – Yahoo

    Placer County town of Loomis considers entertainment zone for downtown – CBS News

    Loomis Unveils Thrilling New Entertainment Zone to Revitalize Downtown

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Rydberg Technologies Inc. Announces Launch of Rydberg Photonics in Berlin – The Quantum Insider

    Rydberg Technologies Launches Exciting New Photonics Division in Berlin

    A look into new technology at Columbia University that could help prevent a dangerous pregnancy complication – ABC7 New York

    A look into new technology at Columbia University that could help prevent a dangerous pregnancy complication – ABC7 New York

    Office Technology: Dealers’ Managed IT Revenue up Nearly 30% – The Cannata Report –

    Office Technology: Dealers’ Managed IT Revenue up Nearly 30% – The Cannata Report –

    3 E Network Technology Group Limited Closes $1.5 Million Convertible Promissory Note Offering – Quiver Quantitative

    3 E Network Technology Group Limited Closes $1.5 Million Convertible Promissory Note Offering – Quiver Quantitative

    3 Technology Stocks to Buy Now – Yahoo Finance

    3 Must-Buy Tech Stocks You Can’t Afford to Miss Right Now

    ‘New frontier’: Austin leaders start discussions on air taxi technology – KXAN Austin

    Austin Leaders Ignite Exciting Conversations on the Future of Air Taxi Technology

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Technology

Protecting Secrets from Computers (2023)

January 30, 2024
in Technology
Protecting Secrets from Computers (2023)
Share on FacebookShare on Twitter

ACM Digital Library

Skip Abstract Section

Abstract

Bob is in prison and Alice is dead; they trusted computers with secrets. Review time-tested tricks that can help you avoid the grim fate of the old crypto couple.

Ball, J., Borger, J., and Greenwald, G. 2013. Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security.Google ScholarGoogle ScholarBarak, B. 2021. An Intensive Introduction to Cryptography. https://intensecrypto.org/public/index.html and https://files.boazbarak.org/crypto/lnotes_book.pdf.Google ScholarGoogle ScholarBauer, F.L. 2000. Decrypted Secrets. Springer, second edition. ISBN 3-540-66871-3. See p. 26 regarding print newspapers.Google ScholarGoogle ScholarBerghel, H. 2019. Vehicle telematics: The good, bad and ugly. IEEE Computer, 52(1):66?70. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8666649.Google ScholarGoogle ScholarDigital LibraryDigital LibraryJeff Bezos phone hacking incident. 2023. https://en.wikipedia.org/wiki/Jeff_Bezos_phone_hacking_incident.Google ScholarGoogle ScholarBoneh, D. and Shoup, V. 2023. A Graduate Course in Applied Cryptography. https://toc.cryptobook.us/book.pdf.Google ScholarGoogle ScholarBrandom, R. 2016. Why can’t Apple spend its way out of security vulnerabilities? The Verge. https://www.theverge.com/2016/8/26/12660800/apple-ios-security-bug-bounty-payouts.Google ScholarGoogle ScholarCaesar, Ed. 2023. Crooks’ Mistaken Bet on Encrypted Phones. The New Yorker, 32?43, April 17, 2023. https://www.newyorker.com/magazine/2023/04/24/crooks-mistaken-bet-on-encrypted-phones.Google ScholarGoogle ScholarChaum, D. 1988. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1(1):65?75. HTML version available at http://www.cs.cornell.edu/People/egs/herbivore/dcnets.html.Google ScholarGoogle ScholarCross RefCross RefCheck digit. 2023. https://en.wikipedia.org/wiki/Check_digit.Google ScholarGoogle ScholarDewdney, A. K. 1984. On the spaghetti computer and other analog gadgets for problem solving. Scientific American, 250(6):19?26. The basics are explained at http://dataphys.org/list/dewdneys-analog-gadgets/.Google ScholarGoogle ScholarDozier, K. and Yost, P. 2012. Petraeus shocked to hear of emails, associates say. Associated Press. https://web.archive.org/web/20121113030944/http://m.apnews.com/ap/db_289563/contentdetail.htm?contentguid=VOlvNjF4.Google ScholarGoogle ScholarEdwards, J. 2014. Emails Show Apple’s Steve Jobs and Google’s Eric Schmidt Allegedly Conspired to Screw Over Employees. Business Insider. https://www.businessinsider.com/apple-google-recruitment-emails-lawsuit-2014-1.Google ScholarGoogle ScholarBrennan Center for Justice. Securing the nation’s voting machines: A toolkit for advocates and election officials, June 2018. https://www.brennancenter.org/sites/default/files/2019-08/Report_Securing__Voting_Machines.pdf.Google ScholarGoogle ScholarGoodin, D. 2023. The Spy Who Hacked Me: ?Clickless? iOS exploits infect Kaspersky iPhones with never-before-seen malware; ?Operation Triangulation? stole mic recordings, photos, geolocation, and more. https://arstechnica.com/information-technology/2023/06/clickless-ios-exploits-infect-kaspersky-iphones-with-never-before-seen-malware/.Google ScholarGoogle ScholarGreenwald, G. 2014. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York, NY: Metropolitan Books. ISBN 978-1-62779-073-4.Google ScholarGoogle ScholarDigital LibraryDigital LibraryHarris, M. 2023. The Panopticon v. the Capitol Rioters. IEEE Spectrum, 60(2):32?37, 46. https://ieeexplore.ieee.org/document/10040551/.Google ScholarGoogle ScholarCross RefCross RefLehrer, T. 2000. ?Werner von Braun.? Originally from That Was the Year That Was (1965). Also available on The Remains of Tom Lehrer, Warner Bros. https://genius.com/Tom-lehrer-wernher-von-braun-lyrics and https://www.youtube.com/watch?v=QEJ9HrZq7Ro.Google ScholarGoogle ScholarLiptak, K. 2015. U.S. government hacked; feds think China is the culprit. Cable News Network. http://www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/.Google ScholarGoogle ScholarModulo bias. 2023. https://en.wikipedia.org/wiki/Fisher%E2%80%93Yates_shuffle#Modulo_bias.Google ScholarGoogle ScholarNaor, M., Naor, Y., and Reingold, O. 1999. Applied kid cryptography ?or? how to convince your children you are not cheating. Paper: https://www.wisdom.weizmann.ac.il/~naor/PAPERS/waldo_abs.html. Talk: https://www.youtube.com/watch?v=L3AmP6IQLtg.Google ScholarGoogle ScholarNaor, M. and Shamir, A., 1994. Visual cryptography. In Proceedings of EUROCRYPT, volume 950 of Lecture Notes in Computer Science, 1?12. New York, NY: Springer. doi:10.1007/BFb0053419. https://www.cs.jhu.edu/~fabian/courses/CS600.624/NaorShamir-VisualCryptography.pdfGoogle ScholarGoogle ScholarNumbers stations. 2023. https://en.wikipedia.org/wiki/Numbers_stations.Google ScholarGoogle ScholarOnion News Network. 2011. CIA’s ?Facebook? program dramatically cut agency’s costs. https://www.theonion.com/cias-facebook-program-dramatically-cut-agencys-costs-1819594988 and https://www.youtube.com/watch?v=ZJ380SHZvYU.Google ScholarGoogle ScholarPegasus (spyware). 2023. https://en.wikipedia.org/wiki/Pegasus_(spyware).Google ScholarGoogle ScholarDavid Petraeus. 2023. https://en.wikipedia.org/wiki/David_Petraeus.Google ScholarGoogle ScholarRandom dot stereogram. 2023. https://en.wikipedia.org/wiki/Random_dot_stereogram.Google ScholarGoogle ScholarRogaway, P. 2016. The moral character of cryptographic work. https://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf. Based on an Asiacrypt 2015 talk.Google ScholarGoogle ScholarSanders, S. 2015. Massive data breach puts 4 million federal employees’ records at risk. National Public Radio. https://www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk.Google ScholarGoogle ScholarSchneier, B. 1999. The Solitaire Encryption Algorithm. https://www.schneier.com/academic/solitaire/. See also http://www.ciphergoth.org/crypto/solitaire/.Google ScholarGoogle ScholarSchneier, B. 2015. Applied Cryptography. Hoboken, NJ: Wiley, 20th anniversary edition. ISBN 978-1-119-096726. See Afterword by Matt Blaze for NSA quote and p. 228 for cover-message trick.Google ScholarGoogle ScholarShamir, A. 1979. How to share a secret. Communications of the ACM 22(11):612?613. https://dl.acm.org/doi/10.1145/359168.359176.Google ScholarGoogle ScholarSimons, B. 2006. Statement of Barbara Simons for the Committee on House Administration Hearing on Electronic Voting Machines. https://www.acm.org/binaries/content/assets/public-policy/usacm/e-voting/testimony/simons_testimony.pdf.Google ScholarGoogle ScholarThe Deadly Years (Star Trek episode). 2023. https://en.wikipedia.org/wiki/The_Deadly_Years.Google ScholarGoogle ScholarThompson, K. 1984. Reflections on trusting trust [Turing Award lecture]. Communications of the ACM 27(8). https://dl.acm.org/doi/pdf/10.1145/358198.358210.Google ScholarGoogle ScholarThe New York Times. 2013. Secret documents reveal N.S.A. campaign against encryption. https://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html.Google ScholarGoogle ScholarZuboff, S. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. New York, NY: Public Affairs. ISBN 978-1-5417-5800-1.Google ScholarGoogle Scholar

Recommendations

An extensive review on quantum computers

Highlights

Quantum Error Correction (QEC) secured quantum data from decoherence and quantum noise.

Abstract

Quantum Computing is a rapidly arising innovation that tackles the laws of quantum mechanics to take care of issues excessively complex for already available classical computers. The development of quantum computers is the most …

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

InformationContributors

Published in

cover image Queue

Queue  Volume 21, Issue 4

Confidential Computing

July/August 2023

118 pages

Copyright © 2023 ACM

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 September 2023

Check for updates

Check for updates on crossmark

Qualifiers

columnOpinionEditor picked

Conference

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : Hacker News – https://dl.acm.org/doi/10.1145/3623614

Tags: ProtectingSecretstechnology
Previous Post

Dracula Theme for Hacker News

Next Post

When did cold, carbonated beer become the standard, and was there pushback?

Forest cover enhances pest control by birds and bats independently of vineyard management intensity – besjournals

Forest cover enhances pest control by birds and bats independently of vineyard management intensity – besjournals

October 22, 2025
November Family Consumer Science Program – Alachua County

November Family Consumer Science Program – Alachua County

October 22, 2025
Correction: Anti-Science Movement story – The News-Gazette

Unraveling the Truth Behind the Anti-Science Movement: A Closer Look

October 22, 2025
Best Burgers 2025: 9 cult-favorite burgers off the beaten path – Yahoo

Best Burgers 2025: 9 cult-favorite burgers off the beaten path – Yahoo

October 22, 2025
Rydberg Technologies Inc. Announces Launch of Rydberg Photonics in Berlin – The Quantum Insider

Rydberg Technologies Launches Exciting New Photonics Division in Berlin

October 22, 2025
Forbes Unveils First-Ever “Most Powerful Women In Sports” List, Featuring 25 Of The Trailblazers Transforming The Industry, Including Gayle Benson, Caitlin Clark, Michele Kang, Serena Williams And More – Forbes

Meet the 25 Trailblazing Women Revolutionizing the World of Sports, Featuring Gayle Benson, Caitlin Clark, Michele Kang, Serena Williams and More

October 22, 2025
Grandmaster Daniel Naroditsky remembered for his impact on the chess world – NPR

Grandmaster Daniel Naroditsky: Honoring a Timeless Chess Legacy

October 22, 2025
Seattle’s Creative Economy: Building Talent, Culture, and Community – GeekWire

Seattle’s Creative Economy: How Talent, Culture, and Community Are Shaping the Future

October 22, 2025
Sacramento city leaders approve adding 2 entertainment zones in midtown – CBS News

Sacramento City Leaders Approve Two Thrilling New Entertainment Zones in Midtown

October 22, 2025
Self-efficacy mediates the effect of hope on health promotion intention in Chinese stroke patients – Nature

How Hope Boosts Health Motivation in Chinese Stroke Patients Through Self-Efficacy

October 22, 2025

Categories

Archives

October 2025
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  
« Sep    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (881)
  • Economy (902)
  • Entertainment (21,773)
  • General (17,746)
  • Health (9,943)
  • Lifestyle (915)
  • News (22,149)
  • People (903)
  • Politics (912)
  • Science (16,113)
  • Sports (21,402)
  • Technology (15,882)
  • World (885)

Recent News

Forest cover enhances pest control by birds and bats independently of vineyard management intensity – besjournals

Forest cover enhances pest control by birds and bats independently of vineyard management intensity – besjournals

October 22, 2025
November Family Consumer Science Program – Alachua County

November Family Consumer Science Program – Alachua County

October 22, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version