Search for tag: "adversary"

SURF: Eavesdropping on Underwater Communications from the Air, Poorya Mollahosseini, GS (1B355730)

This project investigates how an airborne node can eavesdrop on the underwater acoustic communication between submerged nodes. Conventionally, such eavesdropping has been assumed impossible as…

+20 More
From  Research Princeton Research Day 0 likes 62 plays

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…

+28 More
From  Research Princeton Research Day 4 likes 89 plays

DeCenter Seminar Lecture: "Correctness Conditions for Cross-Chain Deals"

From  Broadcast Broadcast Center Staff 0 likes 8 plays

OURSIP Intern - Christopher Roberts

Vulnerabilities with mmWave Smart Surfaces Mentors: Dr. Yasaman Ghasempour, ECE Haoze Chen, ECE

+19 More
From  our Undergraduate Research 2 likes 29 plays

SmartCookie: Distributed In-Network SYN Flooding Mitigation, Sophia Yoo, G2 (3938706)

SYN-flooding attacks, a pervasive class of DDoS attacks, target the TCP three-way handshake to exhaust server resources, leading to poor performance for legitimate clients. In this work, we present…

+19 More
From  Research Princeton Research Day 0 likes 126 plays