Search for: "Josh Benaloh" Results 1 - 9 of 9
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
30 Nov 2018, 11:27 am by Mikhaila Fogel
In the second Crypto essay, Josh Benaloh, a senior cryptographer at Microsoft Research, argued that there may be no responsible encryption back-doors for law enforcement. [read post]
28 Sep 2016, 4:04 am by Susan Landau
Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. [read post]
7 Sep 2016, 8:06 am by Michael A. Specter
Bellovin, Josh Benaloh, Matt Blaze,Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. [read post]
24 Aug 2017, 11:00 am by Matt Bishop
  This piece reflects the contributions of the following individuals: Matt Bishop, University of California, Davis Philip Stark, University of California, Berkeley Josh Benaloh, Microsoft Research Joseph Kiniry, Free and Fair Ron Rivest, MIT Sean Peisert, University of California, Davis Joseph Hall, Center for Democracy and Technology Vanessa Teague, University of Melbourne (Australia) [read post]
1 Dec 2018, 12:26 pm by Anushka Limaye, Mikhaila Fogel
As part of the Crypto series, Josh Benaloh explored the pitfalls of so-called “responsible” encryption backdoors. [read post]
6 Oct 2016, 11:57 am by Aaron Jue and Karen Gullo
Bellovin, Columbia University Josh Benaloh, Microsoft Research Matt Blaze, University of Pennsylvania Whitfield Diffie, who in 1975 helped discover the concept of public-key cryptography John Gilmore, co-founder of the Electronic Frontier Foundation, Matthew Green, Johns Hopkins University Peter G. [read post]
11 May 2016, 9:00 am by Daniel J. Weitzner
Bellovin, Josh Benaloh, Matt Blaze,Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. [read post]
26 Dec 2018, 7:00 am by Susan Landau
Josh Benaloh presents an excellent discussion of the irresponsibility of so-called “responsible encryption,” and Cindy Cohn persuasively argues that the computer security community should be working to improve the security of systems, not the reverse. [read post]