Photo by Markus Winkler on Unsplash

Four Generations of Homomorphic Encryption And An Eight-fold Improvement Each Year … As Defined By Craig Gentry

--

The dream for cybersecurity is that data is protected at rest, over-air and in-process. While we often use encryption to store data (“at rest), and use TLS and tunnels to protect over the network (“over air”), we still do not encrypt in-process. It is there that intruders can capture sensitive data…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.