Hardware Realization and Implementation Security Evaluation of HQC, A NIST PQC Standard
Quantum computing is no longer a distant dream, its rapid progress is poised to revolutionize various fields from drug discovery to optimization. But this leap forward comes with a critical caveat: the pre-quantum public-key cryptographic…
Research Intern – Cryptography and Applications
As a Research Intern in the Strategic Planning and Architecture (SPARC) group, you will contribute to the research, design, and development of cryptos & crypto applications for Caliptra and its usage models. This role encompasses…
Media Authenticity Methods in Practice: Capabilities, Limitations, and Directions
As synthetic media grows, verifying what’s real, and the origin of content, matters more than ever. Our latest report explores media integrity and authentication methods, their limits, and practical paths toward trustworthy provenance across images,…
Efficient Homomorphic Integer Computer from CKKS
Speaker: Jaehyung KimHost: Patrick Longa Fully homomorphic encryption (FHE) has evolved from Gentry’s original blueprint into a diverse family of practical schemes, including BGV/BFV for exact arithmetic, DM/CGGI-style schemes for fast binary computation, and CKKS…
FineACL
This project studies the data protection challenges when models and agents interact with sensitive data across multiple users. Large language models (LLMs) are increasingly deployed in enterprise settings where thLarge language models (LLMs) are increasingly…
Fuzzy Extractors are Practical
Despite decades of effort, a chasm existed between the theory and practice of device-level biometric authentication. Deployed authentication algorithms rely on data that overtly leaks private information about the biometric; thus, systems rely on externalized…