Kurt RohloffMELTDOWN, SPECTRE AND PROTECTION FROM KERNEL VULNERABILITIESWhenever a running program needs to do anything useful — such as write to a file or open a network connection — it has to temporarily hand…Apr 12, 2018Apr 12, 2018
Kurt RohloffFACEBOOK, PRIVACY AND THE BUSINESS OF DATARecent revelations from Facebook have highlights again how the business of data puts the privacy of wide populations at risk. Many of the…Apr 12, 2018Apr 12, 2018
Kurt RohloffHybrid Methods for Encrypted ComputingIn the design of Duality’s Secure Insights as a Service™, we are often faced with a scenario where there are two entities, a model-owning…Apr 11, 2018Apr 11, 2018
Kurt RohloffHomomorphic Encryption StandardizationIn addition to becoming widely used in practice, homomorphic encryption is also in the process of being standardized. Duality technologies…Apr 11, 2018Apr 11, 2018
Kurt RohloffProxy Re-EncryptionA challenge with prior attempts to commercialize and apply homomorphic encryption is that the output of computations on encrypted data is…Apr 11, 2018Apr 11, 2018
Kurt RohloffThe PALISADE Homomorphic Encryption LibraryDuality Technologies team members are both users and contributors to the PALISADE open-source lattice-encryption library…Apr 11, 2018Apr 11, 2018
Kurt RohloffHomomorphic Encryption — Making it RealFully Homomorphic Encryption (FHE), commonly also referred to as Homomorphic Encryption, is arguably the first and primary breakthrough in…Apr 11, 2018Apr 11, 2018