all InfoSec news
Topic: alice
Traceable Secret Sharing: Strong Security and Efficient Constructions
2 weeks, 6 days ago |
www.iacr.org
Children’s Introduction Guide to Zero Trust
1 month ago |
dev.to
zkPi: Proving Lean Theorems in Zero-Knowledge
1 month, 1 week ago |
www.iacr.org
Multi-Hop Fine-Grained Proxy Re-Encryption
2 months, 1 week ago |
www.iacr.org
Can Alice and Bob Guarantee Output to Carol?
5 months, 1 week ago |
www.iacr.org
A possible protocol for practical anonymous age verification
5 months, 1 week ago |
www.reddit.com
Ideal-SVP is Hard for Small-Norm Uniform Prime Ideals
6 months, 1 week ago |
www.iacr.org
Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE
6 months, 2 weeks ago |
www.iacr.org
Malicious Secure, Structure-Aware Private Set Intersection
7 months, 4 weeks ago |
www.iacr.org
What If Alice Wants Her Story Told?
9 months, 2 weeks ago |
www.iacr.org
Laconic Function Evaluation for Turing Machines
11 months, 3 weeks ago |
www.iacr.org
Non-Interactive Quantum Key Distribution
11 months, 3 weeks ago |
www.iacr.org
Non-Interactive Quantum Key Distribution. (arXiv:2304.02999v1 [quant-ph])
11 months, 3 weeks ago |
arxiv.org
Deniable Authentication when Signing Keys Leak
1 year, 1 month ago |
www.iacr.org
Nothing found.
Items published with this topic over the last 90 days.
Latest
Traceable Secret Sharing: Strong Security and Efficient Constructions
2 weeks, 6 days ago |
www.iacr.org
Children’s Introduction Guide to Zero Trust
1 month ago |
dev.to
zkPi: Proving Lean Theorems in Zero-Knowledge
1 month, 1 week ago |
www.iacr.org
Multi-Hop Fine-Grained Proxy Re-Encryption
2 months, 1 week ago |
www.iacr.org
Can Alice and Bob Guarantee Output to Carol?
5 months, 1 week ago |
www.iacr.org
A possible protocol for practical anonymous age verification
5 months, 1 week ago |
www.reddit.com
Ideal-SVP is Hard for Small-Norm Uniform Prime Ideals
6 months, 1 week ago |
www.iacr.org
Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE
6 months, 2 weeks ago |
www.iacr.org
Malicious Secure, Structure-Aware Private Set Intersection
7 months, 4 weeks ago |
www.iacr.org
What If Alice Wants Her Story Told?
9 months, 2 weeks ago |
www.iacr.org
Laconic Function Evaluation for Turing Machines
11 months, 3 weeks ago |
www.iacr.org
Non-Interactive Quantum Key Distribution
11 months, 3 weeks ago |
www.iacr.org
Non-Interactive Quantum Key Distribution. (arXiv:2304.02999v1 [quant-ph])
11 months, 3 weeks ago |
arxiv.org
Deniable Authentication when Signing Keys Leak
1 year, 1 month ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Nothing found.
Jobs in InfoSec / Cybersecurity
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Azure Security Architect
@ First Quality | Remote US - Eastern or Central Timezone
Lead Security Analyst
@ OpenText | Virtual, CA
Cybersecurity Research Engineer
@ Peraton | Silver Spring, MD, United States
Enterprise Security Engineer
@ Salesforce | California - San Francisco