Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. Af…
Table of Contents: [Article 9] Silence is Golden: Exploiting Jamming and Radio Silence to Communicate (Roberto Di Pietro, Gabriele Oligeri) [Article 10] Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport (Andy Rupp, Foteini Baldimtsi, Gesine Hinterwälder, Christof Paar) [Article 11] Pareto-Optimal Adversarial Defense of Enterprise Systems (Ed…