Cryptographically verifiable data structure having multi-hop forward and backwards links and associated systems and methods
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
This thesis is concerned with the analysis and design of symmetric cryptographic algorithms, with a focus on real-world algorithms. The first part describes original cryptanalysis results, including: The first nontrivial preimage attacks on the (reduced) h ...
At Crypto 2004, van Dijk and Woodruff introduced a new way of using the algebraic tori Tn in cryptography, and obtained an asymptotically optimal n/ϕ(n) savings in bandwidth and storage for a number of cryptographic applications. However, the compu ...
Magnetic nanostructures have long been in the focus of intense research in the magnetic storage industry. For data storage the nonvolatility of magnetic states is of utmost relevance. As information technology generates the need for higher and higher data- ...
For further miniaturization of magnetic data storage devices, instruments for exploring magnetic nanostructures are needed. Hall sensors provide a non invasive technique for quantitative magnetic field detection. In contrast to the highly sensitive semicon ...
Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So far, the security of VC applications has mostly drawn the attention of research ef ...
Recent advancements in micro- and nanoscale fluidic manipulation have enabled the development of a new class of tunable optical structures which are collectively referred to as optofluidic devices. In this paper we will introduce our recent work directed t ...
American Soc Mechanical Engineers, Three Park Avenue, New York, Ny 10016-5990 Usa2005
This article revisits the original designated confirmer signature scheme of Chaum. Following the same spirit we naturally extend the Chaum's construction in a more general setting and analyze its security in a formal way. We prove its security in the rando ...
Security protocols are essential to the proper functioning of any distributed system running over an insecure network but often have flaws that can be exploited even without breaking the cryptography. Formal cryptography, the assumption that the cryptograp ...
This paper presents GosSkip, a self organizing and fully distributed overlay that provides a scalable support to data storage and retrieval in dynamic environments. The structure of GosSkip, while initially possibly chaotic, eventually matches a perfect se ...
Challenges in nanotechnology today involve controlling dimensions, inter-particle spacing, surface coverage and behavior/response of functional nanostructures. Creating or placing nanostructures on surfaces is important for applications like data storage, ...