acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Improvements in Brute Force Attacks
From Schneier on Security

Improvements in Brute Force Attacks

New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.” Abstract: Key lengths...

From Computational Complexity

My Post-Covid Post

 I had been meaning to write a post-COVID post for a while, buta) Are we finally post COVID? (I think so)b) Are the long term affects of  COVID (society not health)...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account