all InfoSec news
Topic: ciphertext
A new lightweight additive homomorphic encryption algorithm
1 month, 2 weeks ago |
arxiv.org
CCA Secure Updatable Encryption from Non-Mappable Group Actions
1 month, 2 weeks ago |
www.iacr.org
Column-wise Garbling, and How to Go Beyond the Linear Model
2 months, 1 week ago |
www.iacr.org
Functional Bootstrapping for FV-style Cryptosystems
3 months, 1 week ago |
www.iacr.org
Revisiting the Slot-to-Coefficient Transformation for BGV and BFV
3 months, 1 week ago |
www.iacr.org
Securing Sensitive Data with Encryption Algorithms
3 months, 2 weeks ago |
dev.to
Chosen Ciphertext Security via BARGs
4 months, 3 weeks ago |
www.iacr.org
Securing symmetric encryption algorithms in Java
6 months, 4 weeks ago |
dev.to
CVE-2022-25332 (omap-l138_firmware)
6 months, 4 weeks ago |
web.nvd.nist.gov
Key Committing Security Analysis of AEGIS
7 months, 2 weeks ago |
www.iacr.org
CVE-2023-4129 (data_protection_central)
7 months, 3 weeks ago |
web.nvd.nist.gov
Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE
8 months, 1 week ago |
www.iacr.org
On the Security of Universal Re-Encryption
9 months, 2 weeks ago |
www.iacr.org
Leaking Secrets in Homomorphic Encryption with Side-Channel Attacks
9 months, 3 weeks ago |
www.iacr.org
Tiresias: Large Scale, Maliciously Secure Threshold Paillier
10 months, 3 weeks ago |
www.iacr.org
Exploiting Noisy Oracles with Bayesian Inference
10 months, 3 weeks ago |
research.nccgroup.com
Coefficient Grouping for Complex Affine Layers
11 months, 2 weeks ago |
www.iacr.org
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience
11 months, 3 weeks ago |
www.iacr.org
Items published with this topic over the last 90 days.
Latest
A new lightweight additive homomorphic encryption algorithm
1 month, 2 weeks ago |
arxiv.org
CCA Secure Updatable Encryption from Non-Mappable Group Actions
1 month, 2 weeks ago |
www.iacr.org
Column-wise Garbling, and How to Go Beyond the Linear Model
2 months, 1 week ago |
www.iacr.org
Functional Bootstrapping for FV-style Cryptosystems
3 months, 1 week ago |
www.iacr.org
Revisiting the Slot-to-Coefficient Transformation for BGV and BFV
3 months, 1 week ago |
www.iacr.org
Securing Sensitive Data with Encryption Algorithms
3 months, 2 weeks ago |
dev.to
Chosen Ciphertext Security via BARGs
4 months, 3 weeks ago |
www.iacr.org
Securing symmetric encryption algorithms in Java
6 months, 4 weeks ago |
dev.to
CVE-2022-25332 (omap-l138_firmware)
6 months, 4 weeks ago |
web.nvd.nist.gov
Key Committing Security Analysis of AEGIS
7 months, 2 weeks ago |
www.iacr.org
CVE-2023-4129 (data_protection_central)
7 months, 3 weeks ago |
web.nvd.nist.gov
Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE
8 months, 1 week ago |
www.iacr.org
On the Security of Universal Re-Encryption
9 months, 2 weeks ago |
www.iacr.org
Leaking Secrets in Homomorphic Encryption with Side-Channel Attacks
9 months, 3 weeks ago |
www.iacr.org
Tiresias: Large Scale, Maliciously Secure Threshold Paillier
10 months, 3 weeks ago |
www.iacr.org
Exploiting Noisy Oracles with Bayesian Inference
10 months, 3 weeks ago |
research.nccgroup.com
Coefficient Grouping for Complex Affine Layers
11 months, 2 weeks ago |
www.iacr.org
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience
11 months, 3 weeks ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Security Operations Manager-West Coast
@ The Walt Disney Company | USA - CA - 2500 Broadway Street
Vulnerability Analyst - Remote (WFH)
@ Cognitive Medical Systems | Phoenix, AZ, US | Oak Ridge, TN, US | Austin, TX, US | Oregon, US | Austin, TX, US
Senior Mainframe Security Administrator
@ Danske Bank | Copenhagen V, Denmark