Zipf’s Law in Passwords

uMine: a Blockchain based on Human Miners

Practical Accountability of Secret Processes

Public Accountability vs. Secret Laws: Can They Coexist?

Efficient Logistic Regression on Large Encrypted Data

Ramanujan graphs in cryptography

Ledger Language Design: Designing and Deploying Formally Verified Public Ledgers

A Formal Security Analysis of the Signal Messaging Protocol

Finger Printing Data

How to Subvert Backdoored Encryption