all InfoSec news
Topic: ciphertext
A new lightweight additive homomorphic encryption algorithm
2 weeks, 3 days ago |
arxiv.org
CCA Secure Updatable Encryption from Non-Mappable Group Actions
2 weeks, 5 days ago |
www.iacr.org
Column-wise Garbling, and How to Go Beyond the Linear Model
1 month, 1 week ago |
www.iacr.org
Functional Bootstrapping for FV-style Cryptosystems
2 months, 1 week ago |
www.iacr.org
Revisiting the Slot-to-Coefficient Transformation for BGV and BFV
2 months, 2 weeks ago |
www.iacr.org
Securing Sensitive Data with Encryption Algorithms
2 months, 3 weeks ago |
dev.to
Chosen Ciphertext Security via BARGs
3 months, 3 weeks ago |
www.iacr.org
Traitor Tracing for Threshold Decryption
5 months, 1 week ago |
www.iacr.org
Simulation-Secure Threshold PKE from LWE with Polynomial Modulus
5 months, 1 week ago |
www.iacr.org
Key Committing Security Analysis of AEGIS
6 months, 2 weeks ago |
www.iacr.org
CVE-2023-4129 (data_protection_central)
6 months, 3 weeks ago |
web.nvd.nist.gov
Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE
7 months, 1 week ago |
www.iacr.org
On the Security of Universal Re-Encryption
8 months, 2 weeks ago |
www.iacr.org
Leaking Secrets in Homomorphic Encryption with Side-Channel Attacks
8 months, 3 weeks ago |
www.iacr.org
Tiresias: Large Scale, Maliciously Secure Threshold Paillier
9 months, 3 weeks ago |
www.iacr.org
Exploiting Noisy Oracles with Bayesian Inference
9 months, 3 weeks ago |
research.nccgroup.com
FortiOS & FortiProxy - SMTP password ciphertext exposure in Log
10 months, 1 week ago |
fortiguard.fortinet.com
Coefficient Grouping for Complex Affine Layers
10 months, 3 weeks ago |
www.iacr.org
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience
10 months, 4 weeks ago |
www.iacr.org
Hardware Acceleration of FHEW
11 months, 2 weeks ago |
www.iacr.org
Finding and Evaluating Parameters for FV using the average-case approach
11 months, 3 weeks ago |
www.iacr.org
Nothing found.
Items published with this topic over the last 90 days.
Latest
A new lightweight additive homomorphic encryption algorithm
2 weeks, 3 days ago |
arxiv.org
CCA Secure Updatable Encryption from Non-Mappable Group Actions
2 weeks, 5 days ago |
www.iacr.org
Column-wise Garbling, and How to Go Beyond the Linear Model
1 month, 1 week ago |
www.iacr.org
Functional Bootstrapping for FV-style Cryptosystems
2 months, 1 week ago |
www.iacr.org
Revisiting the Slot-to-Coefficient Transformation for BGV and BFV
2 months, 2 weeks ago |
www.iacr.org
Securing Sensitive Data with Encryption Algorithms
2 months, 3 weeks ago |
dev.to
Chosen Ciphertext Security via BARGs
3 months, 3 weeks ago |
www.iacr.org
Traitor Tracing for Threshold Decryption
5 months, 1 week ago |
www.iacr.org
Simulation-Secure Threshold PKE from LWE with Polynomial Modulus
5 months, 1 week ago |
www.iacr.org
Key Committing Security Analysis of AEGIS
6 months, 2 weeks ago |
www.iacr.org
CVE-2023-4129 (data_protection_central)
6 months, 3 weeks ago |
web.nvd.nist.gov
Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE
7 months, 1 week ago |
www.iacr.org
On the Security of Universal Re-Encryption
8 months, 2 weeks ago |
www.iacr.org
Leaking Secrets in Homomorphic Encryption with Side-Channel Attacks
8 months, 3 weeks ago |
www.iacr.org
Tiresias: Large Scale, Maliciously Secure Threshold Paillier
9 months, 3 weeks ago |
www.iacr.org
Exploiting Noisy Oracles with Bayesian Inference
9 months, 3 weeks ago |
research.nccgroup.com
FortiOS & FortiProxy - SMTP password ciphertext exposure in Log
10 months, 1 week ago |
fortiguard.fortinet.com
Coefficient Grouping for Complex Affine Layers
10 months, 3 weeks ago |
www.iacr.org
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience
10 months, 4 weeks ago |
www.iacr.org
Hardware Acceleration of FHEW
11 months, 2 weeks ago |
www.iacr.org
Finding and Evaluating Parameters for FV using the average-case approach
11 months, 3 weeks ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Nothing found.
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Security Officer Level 1 (L1)
@ NTT DATA | Virginia, United States of America
Alternance - Analyste VOC - Cybersécurité - Île-De-France
@ Sopra Steria | Courbevoie, France
Senior Security Researcher, SIEM
@ Huntress | Remote US or Remote CAN
Cyber Security Engineer Lead
@ ASSYSTEM | Bridgwater, United Kingdom