chelsea h. komlo

@chelseakomlo

Cryptography, privacy, and distributed systems research and implementation. She/her

Vrijeme pridruživanja: svibanj 2009.

Tweetovi

Blokirali ste korisnika/cu @chelseakomlo

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @chelseakomlo

  1. 1. velj

    Also working with was the best, 14/10 can’t wait to find an excuse to again :)

    Prikaži ovu nit
    Poništi
  2. 1. velj

    Excited for our paper “Mind the Gap: Ceremonies for Applied Secret Sharing” to be in this issue! We assess the security of several common secret sharing use cases and provide recommendations for secure constructions

    Prikaži ovu nit
    Poništi
  3. 23. sij
    Poništi
  4. 16. sij

    Alternatively: Let PK be the victim’s pub key and G be the generator, where PK=sG (s is the secret). Attack: 1. Pick a t modulo the order of G, 2. Compute G’ = (t^(-1))*P, 3. Publish a cert where the public key is PK and the generator is G’. Success when PK is validated but not G

    Poništi
  5. 16. sij
    Poništi
  6. 15. sij

    It can be hard to find good introductions to the mathematical theory of elliptic curves; these course notes are quite good

    Poništi
  7. 15. sij

    Had a mathematical discussion yesterday where a observation was unironically described as a “leap of faith”, how’s your week going.

    Poništi
  8. proslijedio/la je Tweet
    14. sij

    Non-cynical take: This is a huge privacy win! Cynical take: Google is weaponizing the anti-tech coalition’s confusion on privacy/competition trade-offs to lock in their 1st party ad oligopoly (alongside Facebook). It’s probably both.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    13. sij

    , the privacy research group at is considering adopting a new draft on network-based website fingerprinting! Comments and discussion here:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    11. sij

    I just came from a workshop discussing how to stop online child abuse in an end-to-end encrypted world. Many of the solutions depend on trusting the provider. But providers are not always trustworthy.

    Prikaži ovu nit
    Poništi
  11. 11. sij

    Best to date! Thanks to all the organizers for their efforts to put together such a great conference 🖤

    Poništi
  12. 9. sij

    Great talk on Spectre and practical mitigations

    Poništi
  13. proslijedio/la je Tweet
    9. sij

    We put together a site to look for applied crypto research. Eprint is great, but wading through 1500 papers/yr for 100 practical papers is 💩. Join us and help out!

    Prikaži ovu nit
    Poništi
  14. 9. sij

    Excited to learn about real-world deployment of privacy-preserving telemetry deployed in practice!

    Poništi
  15. 8. sij

    Heartened to hear that Ralph Merkle’s paper introducing public key cryptography was initially rejected for publication

    Poništi
  16. 8. sij
    Poništi
  17. 7. sij

    Thanks to and for their helpful feedback on this work

    Prikaži ovu nit
    Poništi
  18. 7. sij

    It’s up! I am excited to announce an extended abstract of our upcoming work on FROST, a Flexible Round-Optimized Schnorr Threshold signature scheme that enables one-round asynchronous threshold signing. This is joint work with and

    Prikaži ovu nit
    Poništi
  19. 3. sij

    Just landed in NYC, excited to be at next week!

    Poništi
  20. proslijedio/la je Tweet

    Even at protests, your phone is emitting a beacon, one that’s invisible to the human eye. This signal is captured and collected, sometimes many times per minute, and keeps broadcasting long after the protesters head to their homes and take off their masks.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·