Homomorphic Encryption with Microsoft SEAL Webinar
In this webinar led by researcher Kim Laine of the Cryptography and Privacy Research group at Microsoft, you’ll learn how SEAL can help software engineers develop data storage and computation services that customers can feel safe using because…
Reusable Non-Interactive Secure Computation
Reproducible Codes and Cryptographic Applications
In this talk I will present a work in progress on structured linear block codes. The investigation starts from well-known examples and generalizes them to a wide class of codes that we call reproducible codes.…
Supersingular isogeny based cryptography gets practical
Talk on post-quantum supersingular isogeny-based cryptography at the Real World Crypto Workshop 2018 in Zurich, Switzerland.
Towards Secure and Interpretable AI: Scalable Methods, Interactive Visualizations, and Practical Tools
The explosion of available idea repositories — scientific papers, patents, product descriptions — represents an unprecedented opportunity to accelerate innovation and lead to a wealth of discoveries. Given the scale of the problem and its…
Post-Quantum TLS
The Transport Layer Security (TLS) protocol The Transport Layer Security (TLS) protocol is one of the most widely-used security protocols in use today, protecting the information exchanged between web clients and servers all around the…
Post-Quantum SSH
The Secure Shell (SSH) protocol The Secure Shell (SSH) protocol is one of the most widely-used security protocols in use today; it protects the information exchanged between clients and servers. SSH is secure against today’s…