Website: greatly improved materials viewing experience
This commit is contained in:
parent
4b6498ede3
commit
d5a06032b0
406 changed files with 159269 additions and 184 deletions
|
@ -133,7 +133,7 @@
|
|||
\begin{itemize}
|
||||
\item \textbf{Usability nightmare}
|
||||
\begin{itemize}
|
||||
\item ``Why Johnny Can't Encrypt'' (1999) - landmark usability study\footnote{\url{https://appliedcryptography.page/papers/johnny-cant.pdf}}
|
||||
\item ``Why Johnny Can't Encrypt'' (1999) - landmark usability study\footnote{\url{https://appliedcryptography.page/papers/\#johnny-cant}}
|
||||
\item Key management too complex for average users
|
||||
\item Easy to make catastrophic mistakes
|
||||
\end{itemize}
|
||||
|
@ -860,7 +860,7 @@
|
|||
\begin{frame}{Enter HKDF: HMAC-based Key Derivation Function}
|
||||
\begin{columns}[c]
|
||||
\begin{column}{0.5\textwidth}
|
||||
\textbf{Motivated by real needs:}\footnote{\url{https://appliedcryptography.page/papers/hkdf-scheme.pdf}}
|
||||
\textbf{Motivated by real needs:}\footnote{\url{https://appliedcryptography.page/papers/\#hkdf-scheme}}
|
||||
\begin{itemize}
|
||||
\item OTR, TLS, IPsec all needed KDFs
|
||||
\item Each had ad-hoc solutions
|
||||
|
@ -1134,7 +1134,7 @@
|
|||
\begin{frame}{Attacks on OTR version 2}
|
||||
\begin{columns}
|
||||
\begin{column}{0.5\textwidth}
|
||||
\textbf{Version Rollback Attack}\footnote{\url{https://appliedcryptography.page/papers/otr-analysis.pdf}}
|
||||
\textbf{Version Rollback Attack}\footnote{\url{https://appliedcryptography.page/papers/\#otr-analysis}}
|
||||
\begin{itemize}
|
||||
\item Version negotiation happens before authentication
|
||||
\item Attacker can force use of older, weaker version
|
||||
|
@ -1516,7 +1516,7 @@
|
|||
\begin{columns}[c]
|
||||
\begin{column}{1\textwidth}
|
||||
\begin{center}
|
||||
\Large \textbf{The Promise and Reality of Post-Compromise Security}\footnote{\url{https://appliedcryptography.page/papers/pcs-impossibility.pdf}}
|
||||
\Large \textbf{The Promise and Reality of Post-Compromise Security}\footnote{\url{https://appliedcryptography.page/papers/\#pcs-impossibility}}
|
||||
\end{center}
|
||||
\vspace{1em}
|
||||
\begin{itemize}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue