Homepage
Open in app
Sign in
Get started
ASecuritySite
When Bob Met Alice
Follow
Homomorphic Encryption With CKKS and BFV For The Inner Product of Two Vectors
Homomorphic Encryption With CKKS and BFV For The Inner Product of Two Vectors
Encryption is one of the weakest implementations within cybersecurity, and where data which is not encrypted can be exposed to data…
Prof Bill Buchanan OBE FRSE
Jul 31
Homomorphic 4-bit Adder Cipher Circuit
Homomorphic 4-bit Adder Cipher Circuit
We give away data when it runs in memory as the bits on a circuit can be examined. But, let’s say we encrypt the bits before we apply them…
Prof Bill Buchanan OBE FRSE
Jul 30
How Can We Determine If Bob Is Older Than Alice, Without Revealing Their Ages?
How Can We Determine If Bob Is Older Than Alice, Without Revealing Their Ages?
The millionaire’s problem has been known for decades, and when two millionaires meet and want to know who has the most money but don’t want…
Prof Bill Buchanan OBE FRSE
Jul 30
The Start of The Blockchain Migration to Post-Quantum Robustness
The Start of The Blockchain Migration to Post-Quantum Robustness
Our finance industry is a core part of our critical national infrastructure. If there were to be any core weaknesses in it, it could cause…
Prof Bill Buchanan OBE FRSE
Jul 28
The Next Great Thing(s) In Cybersecurity: Post Quantum Cryptography and Homomorphic Encryption
The Next Great Thing(s) In Cybersecurity: Post Quantum Cryptography and Homomorphic Encryption
[After a day of compiling C++ code into a useable library, and then getting it integrate with Microsoft Code, here’s a code example]
Prof Bill Buchanan OBE FRSE
Jul 27
The Core Weakness of the Cybersecurity Industry: Lazy Key Management
The Core Weakness of the Cybersecurity Industry: Lazy Key Management
There’s a problem within the cybersecurity industry. Whether it’s Microsoft not updating their Azure key pair for their cloud or SolarWinds…
Prof Bill Buchanan OBE FRSE
Jul 25
Homomorphic Encryption with CKKS
Homomorphic Encryption with CKKS
Those in cryptography have a dream. And that dream is for data to be encrypted in every state: over-air, on-storage and in-process. While…
Prof Bill Buchanan OBE FRSE
Jul 22
About ASecuritySite: When Bob Met Alice
Latest Stories
Archive
About Medium
Terms
Privacy
Teams