all InfoSec news
Topic: computation
Incrementally Verifiable Computation via Rate-1 Batch Arguments
5 days, 10 hours ago |
www.iacr.org
Internship - Verifiable Computation and Computing on Encrypted Data
3 weeks, 4 days ago |
www.iacr.org
Distributed Systems Applied Researcher
3 weeks, 4 days ago |
www.iacr.org
Proof-Carrying Data from Multi-folding Schemes
3 weeks, 5 days ago |
www.iacr.org
Algebraic Cryptanalysis of Full Ciminion
3 weeks, 5 days ago |
www.iacr.org
SIGMA: Secure GPT Inference with Function Secret Sharing
4 weeks, 2 days ago |
www.iacr.org
Practical Key-Extraction Attacks in Leading MPC Wallets
1 month, 1 week ago |
www.iacr.org
PhD Student in Cryptographic Protocols
1 month, 1 week ago |
www.iacr.org
A Note on “Secure Quantized Training for Deep Learning”
1 month, 1 week ago |
www.iacr.org
Towards a Quantum-resistant Weak Verifiable Delay Function
1 month, 2 weeks ago |
www.iacr.org
Long Paper: Provable Secure Parallel Gadgets
1 month, 2 weeks ago |
www.iacr.org
Round-Optimal Black-Box MPC in the Plain Model
1 month, 3 weeks ago |
www.iacr.org
Algebraic Attacks on RAIN and AIM Using Equivalent Representations
1 month, 4 weeks ago |
www.iacr.org
TPU as Cryptographic Accelerator. (arXiv:2307.06554v1 [cs.CR])
2 months, 1 week ago |
arxiv.org
Ph.D. student
2 months, 2 weeks ago |
www.iacr.org
A Guide to Multi-Party Computation (MPC)
2 months, 2 weeks ago |
hackernoon.com
Zero Knowledge Virtual Machine step by step
2 months, 2 weeks ago |
www.iacr.org
E2E near-standard and practical authenticated transciphering
2 months, 2 weeks ago |
www.iacr.org
Depth-Optimized Implementation of ASCON Quantum Circuit
2 months, 2 weeks ago |
www.iacr.org
EDEN - a practical, SNARK-friendly combinator VM and ISA
2 months, 2 weeks ago |
www.iacr.org
Best of Both Worlds: Revisiting the Spymasters Double Agent Problem
2 months, 2 weeks ago |
www.iacr.org
Reusable Secure Computation in the Plain Model
2 months, 3 weeks ago |
www.iacr.org
Incrementally Verifiable Computation via Rate-1 Batch Arguments
5 days, 10 hours ago |
www.iacr.org
Items published with this topic over the last 90 days.
Latest
Incrementally Verifiable Computation via Rate-1 Batch Arguments
5 days, 10 hours ago |
www.iacr.org
Internship - Verifiable Computation and Computing on Encrypted Data
3 weeks, 4 days ago |
www.iacr.org
Distributed Systems Applied Researcher
3 weeks, 4 days ago |
www.iacr.org
Proof-Carrying Data from Multi-folding Schemes
3 weeks, 5 days ago |
www.iacr.org
Algebraic Cryptanalysis of Full Ciminion
3 weeks, 5 days ago |
www.iacr.org
SIGMA: Secure GPT Inference with Function Secret Sharing
4 weeks, 2 days ago |
www.iacr.org
Practical Key-Extraction Attacks in Leading MPC Wallets
1 month, 1 week ago |
www.iacr.org
PhD Student in Cryptographic Protocols
1 month, 1 week ago |
www.iacr.org
A Note on “Secure Quantized Training for Deep Learning”
1 month, 1 week ago |
www.iacr.org
Towards a Quantum-resistant Weak Verifiable Delay Function
1 month, 2 weeks ago |
www.iacr.org
Long Paper: Provable Secure Parallel Gadgets
1 month, 2 weeks ago |
www.iacr.org
Round-Optimal Black-Box MPC in the Plain Model
1 month, 3 weeks ago |
www.iacr.org
Algebraic Attacks on RAIN and AIM Using Equivalent Representations
1 month, 4 weeks ago |
www.iacr.org
TPU as Cryptographic Accelerator. (arXiv:2307.06554v1 [cs.CR])
2 months, 1 week ago |
arxiv.org
Ph.D. student
2 months, 2 weeks ago |
www.iacr.org
A Guide to Multi-Party Computation (MPC)
2 months, 2 weeks ago |
hackernoon.com
Zero Knowledge Virtual Machine step by step
2 months, 2 weeks ago |
www.iacr.org
E2E near-standard and practical authenticated transciphering
2 months, 2 weeks ago |
www.iacr.org
Depth-Optimized Implementation of ASCON Quantum Circuit
2 months, 2 weeks ago |
www.iacr.org
EDEN - a practical, SNARK-friendly combinator VM and ISA
2 months, 2 weeks ago |
www.iacr.org
Best of Both Worlds: Revisiting the Spymasters Double Agent Problem
2 months, 2 weeks ago |
www.iacr.org
Reusable Secure Computation in the Plain Model
2 months, 3 weeks ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Incrementally Verifiable Computation via Rate-1 Batch Arguments
5 days, 10 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Business Information Security Officer
@ Metrolink | Los Angeles, CA
Senior Security Engineer
@ Freedom of the Press Foundation | Remote, 4 hour time zone overlap with New York City
Security Engineer
@ ChartMogul | Remote, EU
Security Analyst, IT - Cyber Security
@ Catholic Healthcare | Macquarie Park, Australia
(1st line) IT Security Officer
@ Vattenfall | Katowice, Poland
Sr. Security Incident Handler
@ Databricks | Remote - California