* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Wednesday, July 2, 2025
Earth-News
  • Home
  • Business
  • Entertainment
    Nantucket Dance Festival opens July 8 – The Inquirer and Mirror

    Nantucket Dance Festival Launches with Thrilling Performances Beginning July 8

    A Secret Society, Ritualistic Killings, and a Century-Old Curse Netflix and YRF Entertainment’s ‘Mandala Murders’ Premieres July 25 – About Netflix

    A Secret Society, Ritualistic Killings, and a Century-Old Curse: Dive into the Chilling World of ‘Mandala Murders’ Premiering July 25

    Susquehanna Raises Penn Entertainment Inc. (PENN) Price Target. – Yahoo Finance

    Susquehanna Raises Price Target for Penn Entertainment Inc. (PENN)

    George Lopez is coming to Spokane – KXLY.com

    George Lopez is coming to Spokane – KXLY.com

    Netflix unveils Dallas immersive venue for fans of hit shows like ‘Squid Game,’ ‘Stranger Things’ – Houston Chronicle

    Step Inside Netflix’s New Dallas Immersive Experience Featuring Hits Like ‘Squid Game’ and ‘Stranger Things

    ‘Puttin’ on the Ritz’: Civic Players bring ‘Young Frankenstein’ to life – Yahoo

    Civic Players Deliver a Hilarious and Unforgettable Performance of ‘Young Frankenstein

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Meiwu Technology Company Limited and Shenzhen Zhinuo – GlobeNewswire

    Meiwu Technology Company Limited and Shenzhen Zhinuo – GlobeNewswire

    Owls inspire new revolutionary noise reduction technology – KTEN

    Owls inspire new revolutionary noise reduction technology – KTEN

    New center coming to Mizzou will focus on energy research and technology – Columbia Missourian

    Mizzou Launches Innovative New Center Dedicated to Energy Research and Technology

    Mirrors in space and underwater curtains: can technology buy us enough time to save the Arctic ice caps? – The Guardian

    Can Technology Like Space Mirrors and Underwater Curtains Buy Us Time to Save the Arctic Ice Caps?

    Naples restaurant owner prepares for hurricane season with new flood technology – Fox4Now.com

    Naples restaurant owner prepares for hurricane season with new flood technology – Fox4Now.com

    Emerging Memory and Storage Technology Market Analysis Report 2025-2034 | AI and HPC Boom Fuels Surging Demand for Fast, Low-Power Memory Devices – Yahoo Finance

    How AI and HPC Are Driving Explosive Growth in Fast, Low-Power Memory Technologies Through 2034

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    Nantucket Dance Festival opens July 8 – The Inquirer and Mirror

    Nantucket Dance Festival Launches with Thrilling Performances Beginning July 8

    A Secret Society, Ritualistic Killings, and a Century-Old Curse Netflix and YRF Entertainment’s ‘Mandala Murders’ Premieres July 25 – About Netflix

    A Secret Society, Ritualistic Killings, and a Century-Old Curse: Dive into the Chilling World of ‘Mandala Murders’ Premiering July 25

    Susquehanna Raises Penn Entertainment Inc. (PENN) Price Target. – Yahoo Finance

    Susquehanna Raises Price Target for Penn Entertainment Inc. (PENN)

    George Lopez is coming to Spokane – KXLY.com

    George Lopez is coming to Spokane – KXLY.com

    Netflix unveils Dallas immersive venue for fans of hit shows like ‘Squid Game,’ ‘Stranger Things’ – Houston Chronicle

    Step Inside Netflix’s New Dallas Immersive Experience Featuring Hits Like ‘Squid Game’ and ‘Stranger Things

    ‘Puttin’ on the Ritz’: Civic Players bring ‘Young Frankenstein’ to life – Yahoo

    Civic Players Deliver a Hilarious and Unforgettable Performance of ‘Young Frankenstein

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Meiwu Technology Company Limited and Shenzhen Zhinuo – GlobeNewswire

    Meiwu Technology Company Limited and Shenzhen Zhinuo – GlobeNewswire

    Owls inspire new revolutionary noise reduction technology – KTEN

    Owls inspire new revolutionary noise reduction technology – KTEN

    New center coming to Mizzou will focus on energy research and technology – Columbia Missourian

    Mizzou Launches Innovative New Center Dedicated to Energy Research and Technology

    Mirrors in space and underwater curtains: can technology buy us enough time to save the Arctic ice caps? – The Guardian

    Can Technology Like Space Mirrors and Underwater Curtains Buy Us Time to Save the Arctic Ice Caps?

    Naples restaurant owner prepares for hurricane season with new flood technology – Fox4Now.com

    Naples restaurant owner prepares for hurricane season with new flood technology – Fox4Now.com

    Emerging Memory and Storage Technology Market Analysis Report 2025-2034 | AI and HPC Boom Fuels Surging Demand for Fast, Low-Power Memory Devices – Yahoo Finance

    How AI and HPC Are Driving Explosive Growth in Fast, Low-Power Memory Technologies Through 2034

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Technology

Protecting Secrets from Computers (2023)

January 30, 2024
in Technology
Protecting Secrets from Computers (2023)
Share on FacebookShare on Twitter

ACM Digital Library

Skip Abstract Section

Abstract

Bob is in prison and Alice is dead; they trusted computers with secrets. Review time-tested tricks that can help you avoid the grim fate of the old crypto couple.

Ball, J., Borger, J., and Greenwald, G. 2013. Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security.Google ScholarGoogle ScholarBarak, B. 2021. An Intensive Introduction to Cryptography. https://intensecrypto.org/public/index.html and https://files.boazbarak.org/crypto/lnotes_book.pdf.Google ScholarGoogle ScholarBauer, F.L. 2000. Decrypted Secrets. Springer, second edition. ISBN 3-540-66871-3. See p. 26 regarding print newspapers.Google ScholarGoogle ScholarBerghel, H. 2019. Vehicle telematics: The good, bad and ugly. IEEE Computer, 52(1):66?70. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8666649.Google ScholarGoogle ScholarDigital LibraryDigital LibraryJeff Bezos phone hacking incident. 2023. https://en.wikipedia.org/wiki/Jeff_Bezos_phone_hacking_incident.Google ScholarGoogle ScholarBoneh, D. and Shoup, V. 2023. A Graduate Course in Applied Cryptography. https://toc.cryptobook.us/book.pdf.Google ScholarGoogle ScholarBrandom, R. 2016. Why can’t Apple spend its way out of security vulnerabilities? The Verge. https://www.theverge.com/2016/8/26/12660800/apple-ios-security-bug-bounty-payouts.Google ScholarGoogle ScholarCaesar, Ed. 2023. Crooks’ Mistaken Bet on Encrypted Phones. The New Yorker, 32?43, April 17, 2023. https://www.newyorker.com/magazine/2023/04/24/crooks-mistaken-bet-on-encrypted-phones.Google ScholarGoogle ScholarChaum, D. 1988. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1(1):65?75. HTML version available at http://www.cs.cornell.edu/People/egs/herbivore/dcnets.html.Google ScholarGoogle ScholarCross RefCross RefCheck digit. 2023. https://en.wikipedia.org/wiki/Check_digit.Google ScholarGoogle ScholarDewdney, A. K. 1984. On the spaghetti computer and other analog gadgets for problem solving. Scientific American, 250(6):19?26. The basics are explained at http://dataphys.org/list/dewdneys-analog-gadgets/.Google ScholarGoogle ScholarDozier, K. and Yost, P. 2012. Petraeus shocked to hear of emails, associates say. Associated Press. https://web.archive.org/web/20121113030944/http://m.apnews.com/ap/db_289563/contentdetail.htm?contentguid=VOlvNjF4.Google ScholarGoogle ScholarEdwards, J. 2014. Emails Show Apple’s Steve Jobs and Google’s Eric Schmidt Allegedly Conspired to Screw Over Employees. Business Insider. https://www.businessinsider.com/apple-google-recruitment-emails-lawsuit-2014-1.Google ScholarGoogle ScholarBrennan Center for Justice. Securing the nation’s voting machines: A toolkit for advocates and election officials, June 2018. https://www.brennancenter.org/sites/default/files/2019-08/Report_Securing__Voting_Machines.pdf.Google ScholarGoogle ScholarGoodin, D. 2023. The Spy Who Hacked Me: ?Clickless? iOS exploits infect Kaspersky iPhones with never-before-seen malware; ?Operation Triangulation? stole mic recordings, photos, geolocation, and more. https://arstechnica.com/information-technology/2023/06/clickless-ios-exploits-infect-kaspersky-iphones-with-never-before-seen-malware/.Google ScholarGoogle ScholarGreenwald, G. 2014. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York, NY: Metropolitan Books. ISBN 978-1-62779-073-4.Google ScholarGoogle ScholarDigital LibraryDigital LibraryHarris, M. 2023. The Panopticon v. the Capitol Rioters. IEEE Spectrum, 60(2):32?37, 46. https://ieeexplore.ieee.org/document/10040551/.Google ScholarGoogle ScholarCross RefCross RefLehrer, T. 2000. ?Werner von Braun.? Originally from That Was the Year That Was (1965). Also available on The Remains of Tom Lehrer, Warner Bros. https://genius.com/Tom-lehrer-wernher-von-braun-lyrics and https://www.youtube.com/watch?v=QEJ9HrZq7Ro.Google ScholarGoogle ScholarLiptak, K. 2015. U.S. government hacked; feds think China is the culprit. Cable News Network. http://www.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/.Google ScholarGoogle ScholarModulo bias. 2023. https://en.wikipedia.org/wiki/Fisher%E2%80%93Yates_shuffle#Modulo_bias.Google ScholarGoogle ScholarNaor, M., Naor, Y., and Reingold, O. 1999. Applied kid cryptography ?or? how to convince your children you are not cheating. Paper: https://www.wisdom.weizmann.ac.il/~naor/PAPERS/waldo_abs.html. Talk: https://www.youtube.com/watch?v=L3AmP6IQLtg.Google ScholarGoogle ScholarNaor, M. and Shamir, A., 1994. Visual cryptography. In Proceedings of EUROCRYPT, volume 950 of Lecture Notes in Computer Science, 1?12. New York, NY: Springer. doi:10.1007/BFb0053419. https://www.cs.jhu.edu/~fabian/courses/CS600.624/NaorShamir-VisualCryptography.pdfGoogle ScholarGoogle ScholarNumbers stations. 2023. https://en.wikipedia.org/wiki/Numbers_stations.Google ScholarGoogle ScholarOnion News Network. 2011. CIA’s ?Facebook? program dramatically cut agency’s costs. https://www.theonion.com/cias-facebook-program-dramatically-cut-agencys-costs-1819594988 and https://www.youtube.com/watch?v=ZJ380SHZvYU.Google ScholarGoogle ScholarPegasus (spyware). 2023. https://en.wikipedia.org/wiki/Pegasus_(spyware).Google ScholarGoogle ScholarDavid Petraeus. 2023. https://en.wikipedia.org/wiki/David_Petraeus.Google ScholarGoogle ScholarRandom dot stereogram. 2023. https://en.wikipedia.org/wiki/Random_dot_stereogram.Google ScholarGoogle ScholarRogaway, P. 2016. The moral character of cryptographic work. https://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf. Based on an Asiacrypt 2015 talk.Google ScholarGoogle ScholarSanders, S. 2015. Massive data breach puts 4 million federal employees’ records at risk. National Public Radio. https://www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk.Google ScholarGoogle ScholarSchneier, B. 1999. The Solitaire Encryption Algorithm. https://www.schneier.com/academic/solitaire/. See also http://www.ciphergoth.org/crypto/solitaire/.Google ScholarGoogle ScholarSchneier, B. 2015. Applied Cryptography. Hoboken, NJ: Wiley, 20th anniversary edition. ISBN 978-1-119-096726. See Afterword by Matt Blaze for NSA quote and p. 228 for cover-message trick.Google ScholarGoogle ScholarShamir, A. 1979. How to share a secret. Communications of the ACM 22(11):612?613. https://dl.acm.org/doi/10.1145/359168.359176.Google ScholarGoogle ScholarSimons, B. 2006. Statement of Barbara Simons for the Committee on House Administration Hearing on Electronic Voting Machines. https://www.acm.org/binaries/content/assets/public-policy/usacm/e-voting/testimony/simons_testimony.pdf.Google ScholarGoogle ScholarThe Deadly Years (Star Trek episode). 2023. https://en.wikipedia.org/wiki/The_Deadly_Years.Google ScholarGoogle ScholarThompson, K. 1984. Reflections on trusting trust [Turing Award lecture]. Communications of the ACM 27(8). https://dl.acm.org/doi/pdf/10.1145/358198.358210.Google ScholarGoogle ScholarThe New York Times. 2013. Secret documents reveal N.S.A. campaign against encryption. https://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html.Google ScholarGoogle ScholarZuboff, S. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. New York, NY: Public Affairs. ISBN 978-1-5417-5800-1.Google ScholarGoogle Scholar

Recommendations

An extensive review on quantum computers

Highlights

Quantum Error Correction (QEC) secured quantum data from decoherence and quantum noise.

Abstract

Quantum Computing is a rapidly arising innovation that tackles the laws of quantum mechanics to take care of issues excessively complex for already available classical computers. The development of quantum computers is the most …

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

InformationContributors

Published in

cover image Queue

Queue  Volume 21, Issue 4

Confidential Computing

July/August 2023

118 pages

Copyright © 2023 ACM

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 September 2023

Check for updates

Check for updates on crossmark

Qualifiers

columnOpinionEditor picked

Conference

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : Hacker News – https://dl.acm.org/doi/10.1145/3623614

Tags: ProtectingSecretstechnology
Previous Post

Dracula Theme for Hacker News

Next Post

When did cold, carbonated beer become the standard, and was there pushback?

Late Paleolithic whale bone tools reveal human and whale ecology in the Bay of Biscay – Nature

Ancient Whale Bone Tools Reveal Secrets of Human and Whale Life in the Bay of Biscay

July 2, 2025
Exploring three theories of consciousness. – Psychology Today

Unveiling the Mysteries: Exploring Three Fascinating Theories of Consciousness

July 2, 2025
MIT student wins first-ever Stephen Hawking Junior Medal for Science Communication – MIT News

MIT student wins first-ever Stephen Hawking Junior Medal for Science Communication – MIT News

July 2, 2025
Here’s what your morning routine really says about you – New York Post

What Your Morning Routine Says About Who You Really Are

July 2, 2025
David Muir, Diane Sawyer, Charlie Gibson honor ‘World News Tonight’ stage manager – MSN

David Muir, Diane Sawyer, Charlie Gibson honor ‘World News Tonight’ stage manager – MSN

July 2, 2025
Amid Russian economy warnings, Lavrov says NATO’s increased defense spending will lead to ‘collapse’ of alliance – The Kyiv Independent

Lavrov Warns Soaring NATO Defense Budgets May Spark Alliance Collapse

July 2, 2025
Column: The new book ‘Sick and Dirty’ examines the not-so-hidden queerness of classic Hollywood – Yahoo

Uncovering the Bold Queerness of Classic Hollywood in the New Book ‘Sick and Dirty

July 2, 2025

In Good Health: Vaccines, Menopause, And Cardiovascular Disease : 1A – NPR

July 2, 2025
Bush and Obama fault Trump’s gutting of USAID on agency’s last day – CNN

Bush and Obama fault Trump’s gutting of USAID on agency’s last day – CNN

July 2, 2025
Meiwu Technology Company Limited and Shenzhen Zhinuo – GlobeNewswire

Meiwu Technology Company Limited and Shenzhen Zhinuo – GlobeNewswire

July 2, 2025

Categories

Archives

July 2025
MTWTFSS
 123456
78910111213
14151617181920
21222324252627
28293031 
« Jun    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (702)
  • Economy (727)
  • Entertainment (21,615)
  • General (15,668)
  • Health (9,766)
  • Lifestyle (732)
  • News (22,149)
  • People (728)
  • Politics (734)
  • Science (15,945)
  • Sports (21,224)
  • Technology (15,711)
  • World (708)

Recent News

Late Paleolithic whale bone tools reveal human and whale ecology in the Bay of Biscay – Nature

Ancient Whale Bone Tools Reveal Secrets of Human and Whale Life in the Bay of Biscay

July 2, 2025
Exploring three theories of consciousness. – Psychology Today

Unveiling the Mysteries: Exploring Three Fascinating Theories of Consciousness

July 2, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version