all InfoSec news
Topic: provable security
PhD Position (fully funded)
2 months, 1 week ago |
www.iacr.org
PhD student in Provable Security
5 months, 3 weeks ago |
www.iacr.org
Fully-Funded PhD position in Post-Quantum Cryptography
5 months, 3 weeks ago |
www.iacr.org
Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model
5 months, 4 weeks ago |
www.iacr.org
Threshold Implementations with Non-Uniform Inputs
7 months, 3 weeks ago |
www.iacr.org
Postdoc in Applied and Provable Security group
7 months, 4 weeks ago |
www.iacr.org
Provable Security Analysis of the Secure Remote Password Protocol
8 months, 1 week ago |
www.iacr.org
On security aspects of CRISP
9 months ago |
www.iacr.org
Mask Compression: High-Order Masking on Memory-Constrained Devices
10 months, 2 weeks ago |
www.iacr.org
Postdoctoral researcher
11 months, 1 week ago |
www.iacr.org
Limits in the Provable Security of ECDSA Signatures
11 months, 2 weeks ago |
www.iacr.org
A Tightly Secure Identity-based Signature Scheme from Isogenies
1 year, 2 months ago |
www.iacr.org
Verifiable Distributed Aggregation Functions
1 year, 3 months ago |
www.iacr.org
Ph.D. students and PostDocs
1 year, 4 months ago |
www.iacr.org
Quantum Attacks on Beyond-Birthday-Bound MACs
1 year, 4 months ago |
www.iacr.org
The Limits of Provable Security Against Model Extraction
1 year, 9 months ago |
www.iacr.org
Items published with this topic over the last 90 days.
Latest
PhD Position (fully funded)
2 months, 1 week ago |
www.iacr.org
PhD student in Provable Security
5 months, 3 weeks ago |
www.iacr.org
Fully-Funded PhD position in Post-Quantum Cryptography
5 months, 3 weeks ago |
www.iacr.org
Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model
5 months, 4 weeks ago |
www.iacr.org
Threshold Implementations with Non-Uniform Inputs
7 months, 3 weeks ago |
www.iacr.org
Postdoc in Applied and Provable Security group
7 months, 4 weeks ago |
www.iacr.org
Provable Security Analysis of the Secure Remote Password Protocol
8 months, 1 week ago |
www.iacr.org
On security aspects of CRISP
9 months ago |
www.iacr.org
Mask Compression: High-Order Masking on Memory-Constrained Devices
10 months, 2 weeks ago |
www.iacr.org
Postdoctoral researcher
11 months, 1 week ago |
www.iacr.org
Limits in the Provable Security of ECDSA Signatures
11 months, 2 weeks ago |
www.iacr.org
A Tightly Secure Identity-based Signature Scheme from Isogenies
1 year, 2 months ago |
www.iacr.org
Verifiable Distributed Aggregation Functions
1 year, 3 months ago |
www.iacr.org
Ph.D. students and PostDocs
1 year, 4 months ago |
www.iacr.org
Quantum Attacks on Beyond-Birthday-Bound MACs
1 year, 4 months ago |
www.iacr.org
The Limits of Provable Security Against Model Extraction
1 year, 9 months ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC