Homepage
Open in app
Sign in
Get started
ASecuritySite
When Bob Met Alice
Follow
Want To Learn Cryptography? Understand The Principles: Here’s Some Podcasts
Want To Learn Cryptography? Understand The Principles: Here’s Some Podcasts
I may be wrong, but those with excellent skills in cryptography, earn some of the highest salaries in the industry. Why? Well, in research…
Prof Bill Buchanan OBE FRSE
Aug 9
AI Can Be Private: Homomorphic Encryption and Artifical Neural Networks
AI Can Be Private: Homomorphic Encryption and Artifical Neural Networks
You may have seen that companies such as Apple and Google are starting to use homomorphic encryption for data gathering. With this, they…
Prof Bill Buchanan OBE FRSE
Aug 9
Proxy Re-encryption (PRE) using CKKS Homomorphic Encryption
Proxy Re-encryption (PRE) using CKKS Homomorphic Encryption
We live in a legal world of proxies. When you purchase a house, you will use a trusted solicitor to act on your behalf. So, if Alice is…
Prof Bill Buchanan OBE FRSE
Aug 7
Serialization of Homomorphic Encryption Elements
Serialization of Homomorphic Encryption Elements
In any program, we can have data objects and which are represented in a binary format. These reside in memory. But what if we need to send…
Prof Bill Buchanan OBE FRSE
Aug 6
Approximating Functions Using Polynomials: Chebyshev Approximation in Homomorphic Encryption
Approximating Functions Using Polynomials: Chebyshev Approximation in Homomorphic Encryption
Like it or not, we are moving to a foundation of cybersecurity which moves us away from our traditional public key methods into a world…
Prof Bill Buchanan OBE FRSE
Aug 4
Homomorphic Encryption With CKKS and BFV For The Inner Product of Two Vectors
Homomorphic Encryption With CKKS and BFV For The Inner Product of Two Vectors
Encryption is one of the weakest implementations within cybersecurity, and where data which is not encrypted can be exposed to data…
Prof Bill Buchanan OBE FRSE
Jul 31
Homomorphic 4-bit Adder Cipher Circuit
Homomorphic 4-bit Adder Cipher Circuit
We give away data when it runs in memory as the bits on a circuit can be examined. But, let’s say we encrypt the bits before we apply them…
Prof Bill Buchanan OBE FRSE
Jul 30
About ASecuritySite: When Bob Met Alice
Latest Stories
Archive
About Medium
Terms
Privacy
Teams