Homepage
Open in app
Sign in
Get started
ASecuritySite
When Bob Met Alice
Follow
Serialization of Homomorphic Encryption Elements
Serialization of Homomorphic Encryption Elements
In any program, we can have data objects and which are represented in a binary format. These reside in memory. But what if we need to send…
Prof Bill Buchanan OBE FRSE
Aug 6
Approximating Functions Using Polynomials: Chebyshev Approximation in Homomorphic Encryption
Approximating Functions Using Polynomials: Chebyshev Approximation in Homomorphic Encryption
Like it or not, we are moving to a foundation of cybersecurity which moves us away from our traditional public key methods into a world…
Prof Bill Buchanan OBE FRSE
Aug 4
Homomorphic Encryption With CKKS and BFV For The Inner Product of Two Vectors
Homomorphic Encryption With CKKS and BFV For The Inner Product of Two Vectors
Encryption is one of the weakest implementations within cybersecurity, and where data which is not encrypted can be exposed to data…
Prof Bill Buchanan OBE FRSE
Jul 31
Homomorphic 4-bit Adder Cipher Circuit
Homomorphic 4-bit Adder Cipher Circuit
We give away data when it runs in memory as the bits on a circuit can be examined. But, let’s say we encrypt the bits before we apply them…
Prof Bill Buchanan OBE FRSE
Jul 30
How Can We Determine If Bob Is Older Than Alice, Without Revealing Their Ages?
How Can We Determine If Bob Is Older Than Alice, Without Revealing Their Ages?
The millionaire’s problem has been known for decades, and when two millionaires meet and want to know who has the most money but don’t want…
Prof Bill Buchanan OBE FRSE
Jul 30
The Start of The Blockchain Migration to Post-Quantum Robustness
The Start of The Blockchain Migration to Post-Quantum Robustness
Our finance industry is a core part of our critical national infrastructure. If there were to be any core weaknesses in it, it could cause…
Prof Bill Buchanan OBE FRSE
Jul 28
The Next Great Thing(s) In Cybersecurity: Post Quantum Cryptography and Homomorphic Encryption
The Next Great Thing(s) In Cybersecurity: Post Quantum Cryptography and Homomorphic Encryption
[After a day of compiling C++ code into a useable library, and then getting it integrate with Microsoft Code, here’s a code example]
Prof Bill Buchanan OBE FRSE
Jul 27
About ASecuritySite: When Bob Met Alice
Latest Stories
Archive
About Medium
Terms
Privacy
Teams