Search for tag: "adversary"

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…

From  Research Princeton Research Day 4 likes 80 plays

DeCenter Seminar Lecture: "Correctness Conditions for Cross-Chain Deals"

From  Broadcast Broadcast Center Staff 0 likes 8 plays

OURSIP Intern - Christopher Roberts

Vulnerabilities with mmWave Smart Surfaces Mentors: Dr. Yasaman Ghasempour, ECE Haoze Chen, ECE

From  our Undergraduate Research 2 likes 26 plays

SmartCookie: Distributed In-Network SYN Flooding Mitigation, Sophia Yoo, G2 (3938706)

SYN-flooding attacks, a pervasive class of DDoS attacks, target the TCP three-way handshake to exhaust server resources, leading to poor performance for legitimate clients. In this work, we present…

From  Research Princeton Research Day 0 likes 120 plays