all InfoSec news
Topic: theory
Two generalizations of almost perfect nonlinearity
1 day, 20 hours ago |
www.iacr.org
New Solutions to Delsarte's Dual Linear Programs
2 weeks, 2 days ago |
www.iacr.org
Levin–Kolmogorov Complexity is not in Linear Time
3 weeks, 5 days ago |
www.iacr.org
Dropzone AI raises $16.85 Million Series A
1 month, 1 week ago |
ai-techpark.com
EASIT: 2024 IEEE East Asian School of Information Theory
2 months, 1 week ago |
www.iacr.org
Local Approximation of Secrecy Capacity
2 months, 1 week ago |
arxiv.org
New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs
2 months, 3 weeks ago |
www.iacr.org
Discrete Maths for Devs: An brief introduction to Mathematical Logic
2 months, 3 weeks ago |
dev.to
Robustness Bounds on the Successful Adversarial Examples: Theory and Practice
2 months, 3 weeks ago |
arxiv.org
On efficient normal bases over binary fields
3 months, 1 week ago |
arxiv.org
Data protection psychology using game theory
3 months, 2 weeks ago |
arxiv.org
Formal Verification of the Sumcheck Protocol
3 months, 3 weeks ago |
arxiv.org
Efficient $(3,3)$-isogenies on fast Kummer surfaces
3 months, 3 weeks ago |
arxiv.org
How does it happen in an enterprise: Vulnerability management
3 months, 4 weeks ago |
www.reddit.com
Efficient (3,3)-isogenies on fast Kummer surfaces
3 months, 4 weeks ago |
www.iacr.org
Items published with this topic over the last 90 days.
Latest
Two generalizations of almost perfect nonlinearity
1 day, 20 hours ago |
www.iacr.org
New Solutions to Delsarte's Dual Linear Programs
2 weeks, 2 days ago |
www.iacr.org
Levin–Kolmogorov Complexity is not in Linear Time
3 weeks, 5 days ago |
www.iacr.org
Dropzone AI raises $16.85 Million Series A
1 month, 1 week ago |
ai-techpark.com
EASIT: 2024 IEEE East Asian School of Information Theory
2 months, 1 week ago |
www.iacr.org
Local Approximation of Secrecy Capacity
2 months, 1 week ago |
arxiv.org
New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs
2 months, 3 weeks ago |
www.iacr.org
Discrete Maths for Devs: An brief introduction to Mathematical Logic
2 months, 3 weeks ago |
dev.to
Robustness Bounds on the Successful Adversarial Examples: Theory and Practice
2 months, 3 weeks ago |
arxiv.org
On efficient normal bases over binary fields
3 months, 1 week ago |
arxiv.org
Data protection psychology using game theory
3 months, 2 weeks ago |
arxiv.org
Formal Verification of the Sumcheck Protocol
3 months, 3 weeks ago |
arxiv.org
Efficient $(3,3)$-isogenies on fast Kummer surfaces
3 months, 3 weeks ago |
arxiv.org
How does it happen in an enterprise: Vulnerability management
3 months, 4 weeks ago |
www.reddit.com
Efficient (3,3)-isogenies on fast Kummer surfaces
3 months, 4 weeks ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC