memory-leaks

Still reachable: lots of words in many pages.
git clone https://git.kevinlegouguec.net/memory-leaks
Log | Files | Refs | README | LICENSE

commit 1d4f2d369d47f2169ddf975bcdb7e35c3edb76a0
parent 52aa374d2674af8ccec8304e34c922d7ff15ff2e
Author: Kévin Le Gouguec <kevin.legouguec@gmail.com>
Date:   Thu,  9 Jul 2020 23:15:48 +0200

Add LIRIS internship

Diffstat:
Mpersonal/cv/cv.org | 14++++++++++++++
1 file changed, 14 insertions(+), 0 deletions(-)

diff --git a/personal/cv/cv.org b/personal/cv/cv.org @@ -59,3 +59,17 @@ informative foray into the world of cryptographic APIs, such as: ECDSA signatures lacking the [[https://www.cryptsoft.com/pkcs11doc/v220/group__SEC__12__3__1__EC__SIGNATURES.html][zero-padding expected in PKCS#11]], - [[https://www.openssl.org/][OpenSSL]], to setup PKIs, [[https://stackoverflow.com/a/23422301/1503371][encrypt and sign rulesets, and generate CSRs for keys stored securely on a hardware token]]. +** 2013 (4 months): internship at LIRIS laboratory +I studied two protocols for anonymous communication: + +- [[https://dedis.cs.yale.edu/dissent/][Dissent]] :: "accountable anonymous group communication", +- [[https://hal.inria.fr/hal-00945795][RAC]] :: "freerider-resilent, scalable, anonymous communication" + ([[https://web.archive.org/web/20131018000154/http://www.temple.edu/cis/icdcs2013/data/5000a520.pdf][paper]]). + +The goal was to instrument Dissent's implementation to assess its +performance, then to implement and benchmark RAC in order to validate +the theoretical results presented in its specification. + +While four months proved too short for me to obtain comparable figures +for both protocols, I appreciated the opportunity to dive into the +guts of secure communication protocols.