Search Results for author: Lucy Li

Found 1 papers, 1 papers with code

Protocols for Checking Compromised Credentials

1 code implementation31 May 2019 Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart

Current widely deployed C3 services have the user share a small prefix of a hash computed over the user's password.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.