Cryptology ePrint Archive: Report 2017/141
In this paper we seek for a more flexible, yet secure, GPAKE and put forward the notion of partitioned GPAKE. Partitioned GPAKE tolerates users that run the protocol on different passwords. Through a protocol run, any subgroup of users that indeed share a password, establish a session key, factoring out the ``noise'' of inputs by users holding different passwords.
pake  crypto 
Large-scale cluster management at Google with Borg
Google's Borg system is a cluster manager that runs hundreds of thousands of jobs, from many thousands of different applications, across a number of clusters each with up to tens of thousands of machines
google  distributed 
2 days ago
Computational Complexity and the Anthropic Principle
"Namely, if suicide really were a solution to life's problems, then one could exploit that fact to solve NP-complete problems in polynomial time! I'm thinking of starting a suicide hotline for computer scientists, where I'll explain this point to them."
18 days ago
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
tl;dr If extra subtract in Montgomery reduction is measurable, side channel attack can be mounted even with exponent blinding.
crypto  rsa 
4 weeks ago
ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks
Including a clflush-free rowhammer attack exploiting the L3 cache logic to force DRAM access with plain loads + stores.
rowhammer  security  pdf 
november 2016
Comparison of the 5/16 and 7/16 spouts for tapping maple
UVM extension study - only small reduction in production switching to smaller taps
sugaring  uvm 
october 2016
Abstract: CRIME and BREACH attacks on TLS/SSL leverage the fact that compression ratio is not hidden by encryption to recover content of secrets. We introduce SafeDeflate---a modification of a standard Deflate algorithm which compression ratio does not leak information about secret tokens. The modification is compatible with existing Deflate and gzip decompressors. We introduce a model in which attacker can obtain ciphertexts of arbitrary compressed plaintext containing secret values. Then we prove that SafeDeflate is secure in this model.
compression  crypto 
october 2016
Intel Intrinsics Guide
Very useful interactive search. Also has latency info.
intel  intrinsics  programming 
august 2016
Flush+Flush: A Fast and Stealthy Cache Attack
Uses how long clflush takes as a side channel ...
sidechannel  crypto  doom 
june 2016
« earlier      
advice aes agriculture ai algorithm altivec analysis apache api architecture arm art article assembler awesome beer bitcoin blog book books boost botan brewing business c c++ c++11 cache capabilities cell china code coffee compiler compilers computers concurrency conference corruption cpu crypto cuda culture database datastructures dc debugging design dht distributed diy django documentation e ecc economics economy education electronics energy erlang essay fiction filesystem filter finance firefox food fp framework functional funny games gardening gcc gentoo google government grimmeathookfuture gtd gui hardware hashfunction haskell health history hosting howto humor ibm ietf intel interesting internet interview ipod java javascript json jvm kernel language law learning library lifehacks linux lisp mail management manual maple maps math mceliece memcached memory messaging military money monotone music network networking news nyc ocaml opensource operatingsystem optimization organization p2p paper papers parallel parser parsing patterns paulgraham paxos people performance perl philosophy photo photography physics policestate politics powerpc prion privacy productivity programming protocol psychology python reference reviews rfc rng rsa ruby running scala scheme science scifi search security serialization server shopping sidechannel simd singularity society software spam sql ssl standard statistics stm storage surveillance sysadmin systems tahoe technology testing theory threads tls tool toolbox tools toreview tpm travel tutorial unix usa vermont versioncontrol video visualization web web2.0 windows work writing x11 x509 x86

Copy this bookmark: