 
      
    | You are here | www.jeremykun.com | ||
| | | | | blog.openmined.org | |
| | | | | From the math and the hard problem behind most of today's homomorphic encryption scheme to implementing your own in python. | |
| | | | | www.ayoub-benaissa.com | |
| | | | | This is the first of a series of blog posts about the use of homomorphic encryption for deep learning. Here I introduce the basics and terminology as well as link to external resources that might help with a deeper understanding of the topic. | |
| | | | | jeremykun.wordpress.com | |
| | | | | This article was written by my colleague, Cathie Yun. Cathie is an applied cryptographer and security engineer, currently working with me to make fully homomorphic encryption a reality at Google. She's also done a lot of cool stuff with zero knowledge proofs. In previous articles, we've discussed techniques used in Fully Homomorphic Encryption (FHE) schemes.... | |
| | | | | www.quintessencelabs.com | |
| | | Written by Cloud Security Alliance Quantum Safe Security Working Group. A mysterious paper A research paper titled "Quantum Supremacy Using a Programmable Super | ||