These are my blogs

and also my life

论文笔记:The use of TLS in Censorship Circumvention

2019-09-18 reading tls web

The use of TLS in Censorship Circumvention Network and Distributed Systems Security (NDSS) Symposium 2019 Sergey Frolov, Eric Wustrow. University of ... Read More

论文笔记| maTLS: How to Make TLS middlebox-aware?

2019-09-18 reading tls web

maTLS: How to Make TLS middlebox-aware? Hyunwoo Lee, Zach Smith, Junghwan Lim†, Gyeongjae Choi, Selin Chun, Taejoong Chung, Ted “Taekyoung” Kwon ... Read More

论文阅读| Hybrid key exchange in TLS 1.3 or SSH

2019-09-17 reading tls web

Hybrid key exchange in TLS 1.3 or SSH Draft-stebila-tls-hybrid-design-01 Motivation of hybrid key exchange tranditional algorithms: have risks in ... Read More

RFC 8446| Transport Layer Security 1.3

2019-09-11 reading tls web

Transport Layer Security 1.3 (RFC 8446) 1. Major differences from TLS 1.2 All legacy algorithms have been deprecated. TLS 1.3 uses AEAD instead. ... Read More

论文笔记| Proof-of-Stake Sidechains

2019-07-15 reading S&P2019 blockchain

Brief Authors: Peter Gazˇi,Aggelos Kiayias and Dionysis Zindros conference: S&P2019 系统定义区块链中的 side 链的概率,1️以提高区块链的伸缩性和冗余。证明其非常适合使用POS作为共识机制。并将其实现 ... Read More

论文笔记| Redactable Blockchain or Rewriting history in Bitcoin and friends

2019-07-12 reading S&P2017 blockchain

brief 这篇文章主要引入了 Chameleon Hash 函数。这个函数引入了一对公私钥。使用公钥和消息来产生hash函数。如果不知道私钥,则很难碰撞,但是如果知道私钥,就很容易进行碰撞。 应用于区块链中,则开始产生这样一对秘钥,公钥共享,私钥按照秘密共享的机制使得监督组的部分节点拥有部分私钥。 ... Read More

论文笔记| Redactable Blockchain in the Permissionless Setting

2019-07-10 reading S&P2019 blockchain

Brief Author:Dominic Deuber, Bernardo Magri and Sri Aravinda Krishnan Thyagarajan IEEE S&P 2019 Introductoin 一种基于共识机制的协议,用于解决区块链中非法信息进行预警和和可审计的操 ... Read More

论文笔记| Towards Practical Differentially Private Convex Optimization

2019-07-10 reading S&P2019 machine learning

Brief Roger Iyengar Carnegie Mellon University Om Thakkar Boston University Joseph P. Near University of California, Berkeley Abhradeep Thakurta ... Read More

论文笔记| True2F: Backdoor-resistant authentication tokens

2019-07-09 reading S&P2019 system secruity

Brief author: Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo From: Stanford and Google Introduction 双因子认证是目前对抗弱密码等恶 ... Read More

论文笔记| Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps

2019-07-09 reading S&P2019 cloud security

Brief author: Chaoshun Zuo, Zhiqiang Lin, Yinqian Zhang IEEE S&P 2019 Introduction 系统评估移动终端使用云存储时候的数据泄露 编写程序自动化完成评估 对各种软件进行评估, ... Read More