Accelerating the Delfs-Galbraith algorithm with fast subfield root detection
In this talk, we discuss the general supersingular isogeny problem, the foundational hardness assumption underpinning isogeny-based cryptography. We implement and optimize the best attack against this problem – the Delfs-Galbraith algorithm – to explicitly determine…
Confidential Containers: Verifiably secure computation in the cloud
For many organizations, trusting their data to the cloud requires having a complete understanding of and control over the environment in which that data resides and how it’s being processed. Microsoft understands this, and we…
Private Convex Optimization in General Norms
Long-Term Study of Honeypots in a Public Cloud
Confidential Containers
More and more of the world’s cloud computation is containerized, but these containers are not safe. From web servers to machine learning models, containerization empowers users to build functionality that can be effortlessly moved into…