Cryptographic Protocols


Posted on in Presentations

Protocols related to key rotation and hidden service discovery are discussed. Topic 1: Practical Revocation and Key Rotation Authors: Steven Myers; Dr. Adam Shull Topic 2: Asynchronous Provably Secure Hidden Services Authors: Philippe Camacho; Fernando Krell

Participants
Fernando Krell

Participant

Researcher and Developer Engineer, Dreamlab Technologies

Dr. Adam Shull

Participant

Ph.D. Student, Indiana University

Protecting Data & Applied Crypto

cryptography


Topic

Subtopic


Share With Your Community