Whalers Blog

  • Blog
  • About
  • Admin
  • Categories
  • Contact
    • X
    • Telegram
    • Mastodon
    • Bluesky
  • February 3, 2025

    Cycles and Cuts in Supersingular L-Isogeny Graphs

    ePrint Report: Cycles and Cuts in Supersingular L-Isogeny Graphs Sarah Arpin, Ross Bowden, James Clements, Wissam Ghantous, Jason T. LeGrow, Krystal Maughan Supersingular elliptic curve isogeny graphs underlie isogeny-based cryptography. For isogenies of a single prime degree $ell$, their structure has been investigated graph-theoretically. We generalise the notion of $ell$-isogeny graphs to $L$-isogeny graphs (studied…

    Cryptography, Security
    #cryptography, #security
  • February 3, 2025

    Shadowfax: Combiners for Deniability

    ePrint Report: Shadowfax: Combiners for Deniability Phillip Gajland, Vincent Hwang, Jonas Janneck As cryptographic protocols transition to post-quantum security, most adopt hybrid solutions combining pre-quantum and post-quantum assumptions. However, this shift often introduces trade-offs in terms of efficiency, compactness, and in some cases, even security. One such example is deniability, which enables users, such as…

    Cryptography, Security
    #cryptography, #security
  • February 3, 2025

    Error floor prediction with Markov models for QC-MDPC codes

    ePrint Report: Error floor prediction with Markov models for QC-MDPC codes Sarah Arpin, Jun Bo Lau, Ray Perlner, Angela Robinson, Jean-Pierre Tillich, Valentin Vasseur Quasi-cyclic moderate-density parity check (QC-MDPC) code-based encryption schemes under iterative decoders offer highly-competitive performance in the quantum-resistant space of cryptography, but the decoding-failure rate (DFR) of these algorithms are not well-understood.…

    Cryptography, Security
    #cryptography, #security
  • February 3, 2025

    Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World

    ePrint Report: Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay We propose the first $textit{distributed}$ version of a simple, efficient, and provably quantum-safe pseudorandom function (PRF). The distributed PRF (DPRF) supports arbitrary threshold access structures based on the hardness of the well-studied Learning with Rounding…

    Cryptography, Security
    #cryptography, #security
  • February 3, 2025

    Quantum function secret sharing

    ePrint Report: Quantum function secret sharing Alex B. Grilo, Ramis Movassagh We propose a quantum function secret sharing scheme in which the communication is exclusively classical. In this primitive, a classical dealer distributes a secret quantum circuit $C$ by providing shares to $p$ quantum parties. The parties on an input state $ket{psi}$ and a projection…

    Cryptography, Security
    #cryptography, #security
  • February 3, 2025

    Researcher in Cryptographic Protocols and Key Exchange

    Job Posting: Researcher in Cryptographic Protocols and Key Exchange Technology Innovation Institute (TII), Abu Dhabi, UAE We are looking for a permanent researcher to join the Cryptographic Protocols team within the Cryptography Research Center (CRC) at TII. The main task of the team is to conduct applied academic research and assist in product development, spanning…

    Cryptography, Security
    #cryptography, #security
  • February 3, 2025

    3 priorities for adopting proactive identity and access security in 2025

    If 2024 taught us anything, it’s that a proactive, no-compromises approach to security is essential for 2025 and beyond. Nation-states and advanced cybercriminals are making significant investments in infrastructure and automation to intensify familiar cyberattack patterns; password attacks, for example, escalated from 579 incidents per second in 20211 to 7,000 in 2024.2 These groups are…

  • February 3, 2025

    How the Main Frame Became the Mainframe: an Etymological Dissertation

    In his most recent article, [Ken Shirriff] takes a break from putting ASICs under a microscope, and instead does the same in a proverbial manner with the word ‘mainframe’. Although these days the word ‘mainframe’ brings to mind a lumbering behemoth of a system that probably handles things like finances and other business things, but…

  • February 3, 2025

    Fast-track generative AI security with Microsoft Purview

    As a data security global black belt, I help organizations secure AI solutions. They are concerned about data oversharing, data leaks, compliance, and other potential risks. Microsoft Purview is Microsoft’s solution for securing and governing data in generative AI. I’m often asked how long it takes to deploy Microsoft Purview. The answer depends on the…

  • February 3, 2025

    Giving a Proprietary Power Supply the Boot

    You’ve probably noticed that everywhere you go — the doctor’s office, hotels, or retail shops, there are tiny PCs everywhere. These small PCs often show up on the surplus market for a very good price, but they aren’t quite full-blown PCs. They usually have little option for expansion and are made to be cheap and…

Previous Page
1 … 71 72 73 74 75 … 95
Next Page

Designed by Alireza Gharib