all InfoSec news
Topic: secure computation
Malicious Security for Sparse Private Histograms
2 months, 1 week ago |
www.iacr.org
Spin: An Efficient Secure Computation Framework with GPU Acceleration
3 months, 3 weeks ago |
arxiv.org
Three Party Secure Computation with Friends and Foes
7 months, 1 week ago |
www.iacr.org
One-Message Secure Reductions: On the Cost of Converting Correlations
9 months, 2 weeks ago |
www.iacr.org
Towards Topology-Hiding Computation from Oblivious Transfer
11 months, 3 weeks ago |
www.iacr.org
Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding
11 months, 3 weeks ago |
www.iacr.org
Enabling Two-Party Secure Computation on Set Intersection
1 year, 1 month ago |
www.iacr.org
3-Party Secure Computation for RAMs: Optimal and Concretely Efficient
1 year, 1 month ago |
www.iacr.org
Black-Box Reusable NISC with Random Oracles
1 year, 1 month ago |
www.iacr.org
Sublinear Secure Computation from New Assumptions
1 year, 1 month ago |
www.iacr.org
Cryptographer Internship
1 year, 1 month ago |
www.iacr.org
On Homomorphic Secret Sharing from Polynomial-Modulus LWE
1 year, 2 months ago |
www.iacr.org
Verifiable Multi-Client Functional Encryption for Inner Product
1 year, 3 months ago |
www.iacr.org
Postdoc / PhD
1 year, 4 months ago |
www.iacr.org
Delegated Private Matching for Compute
1 year, 4 months ago |
www.iacr.org
One-Time Programs
1 year, 7 months ago |
blog.cryptographyengineering.com
Nothing found.
Items published with this topic over the last 90 days.
Latest
Malicious Security for Sparse Private Histograms
2 months, 1 week ago |
www.iacr.org
Spin: An Efficient Secure Computation Framework with GPU Acceleration
3 months, 3 weeks ago |
arxiv.org
Three Party Secure Computation with Friends and Foes
7 months, 1 week ago |
www.iacr.org
One-Message Secure Reductions: On the Cost of Converting Correlations
9 months, 2 weeks ago |
www.iacr.org
Towards Topology-Hiding Computation from Oblivious Transfer
11 months, 3 weeks ago |
www.iacr.org
Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding
11 months, 3 weeks ago |
www.iacr.org
Enabling Two-Party Secure Computation on Set Intersection
1 year, 1 month ago |
www.iacr.org
3-Party Secure Computation for RAMs: Optimal and Concretely Efficient
1 year, 1 month ago |
www.iacr.org
Black-Box Reusable NISC with Random Oracles
1 year, 1 month ago |
www.iacr.org
Sublinear Secure Computation from New Assumptions
1 year, 1 month ago |
www.iacr.org
Cryptographer Internship
1 year, 1 month ago |
www.iacr.org
On Homomorphic Secret Sharing from Polynomial-Modulus LWE
1 year, 2 months ago |
www.iacr.org
Verifiable Multi-Client Functional Encryption for Inner Product
1 year, 3 months ago |
www.iacr.org
Postdoc / PhD
1 year, 4 months ago |
www.iacr.org
Delegated Private Matching for Compute
1 year, 4 months ago |
www.iacr.org
One-Time Programs
1 year, 7 months ago |
blog.cryptographyengineering.com
Topic trend (last 90 days)
Top (last 7 days)
Nothing found.
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC