Supersingular isogeny based cryptography gets practical
Talk on post-quantum supersingular isogeny-based cryptography at the Real World Crypto Workshop 2018 in Zurich, Switzerland.
Towards Secure and Interpretable AI: Scalable Methods, Interactive Visualizations, and Practical Tools
The explosion of available idea repositories — scientific papers, patents, product descriptions — represents an unprecedented opportunity to accelerate innovation and lead to a wealth of discoveries. Given the scale of the problem and its…
Post-Quantum TLS
The Transport Layer Security (TLS) protocol The Transport Layer Security (TLS) protocol is one of the most widely-used security protocols in use today, protecting the information exchanged between web clients and servers all around the…
Post-Quantum SSH
The Secure Shell (SSH) protocol The Secure Shell (SSH) protocol is one of the most widely-used security protocols in use today; it protects the information exchanged between clients and servers. SSH is secure against today’s…
Differential Regression Testing for REST APIs
Targeting and Privacy in Mobile Advertising
Mobile in-app advertising is growing in popularity. While these ads have excellent user-tracking properties through mobile device IDs, they have raised concerns among privacy advocates. This has resulted in an ongoing debate on the value…