|
You are here |
www.imperialviolet.org | ||
| | | | |
blog.openmined.org
|
|
| | | | | From the math and the hard problem behind most of today's homomorphic encryption scheme to implementing your own in python. | |
| | | | |
dadrian.io
|
|
| | | | | Large-scale quantum computers are capable of breaking all of the common forms of asymmetric cryptography used on the Internet today. Luckily, they don't exist yet. The Internet-wide transition to post-quantum cryptography began in 2022 when NIST announced their final candidates for key exchange and signatures in the NIST PQC competition. There is plenty written about the various algorithms and standardization processes that are underway. The conventional wisdom is that it will take a long time to transit... | |
| | | | |
www.jeremykun.com
|
|
| | | | | This article was written by my colleague, Cathie Yun. Cathie is an applied cryptographer and security engineer, currently working with me to make fully homomorphic encryption a reality at Google. She's also done a lot of cool stuff with zero knowledge proofs. In previous articles, we've discussed techniques used in Fully Homomorphic Encryption (FHE) schemes. The basis for many FHE schemes, as well as other privacy-preserving protocols, is the Learning With Errors (LWE) problem. | |
| | | | |
rhubbarb.wordpress.com
|
|
| | | My previous post was written with the help of a few very useful tools: LaTeX mathematical typesetting Gummi LaTeX editor Python programming language PyX Python / LaTeX graphics package my own PyPyX wrapper around PyX LaTeX2WP script for easy conversion from LaTeX to WordPress HTML | ||