Tags » Cryptography

On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL

My paper on solving small, sparse secret instances is now on ePrint. Here’s the abstract:

We present novel variants of the dual-lattice attack against LWE in the presence of an unusually short secret.

331 more words

News in brief: Snowden supporters petition Obama; iOS Onion browser now free; bank bans WhatsApp

Your daily round-up of some of the other security stories in the news

Snowden supporters in last-ditch bid for pardon from Obama

As Barack Obama enters his final week in the White House, more than 1m campaigners have signed a… 468 more words


New Books in Mathematics: January 2017

Beyond Infinity: An Expedition to the Outer Limits of Mathematics

Release Date: 14/03/2017

In this book, musician, chef and mathematician Eugenia Cheng reveals the astonishing inner workings of infinity. 414 more words


Symmetric and Asymmetric Ciphers: A comparison

A cipher refers to a secret or disguised way of writing. The context in which it is used here is in reference to cryptographic algorithms and protocols.A Cryptographic cipher/protocol refers to a pair of algorithms to convert plaintext (data we wish to obfuscate) to ciphertext (the data in a form which doesn’t reveal its original content) and vice-versa. 1,209 more words


Google's Key Transparency project aims to ease a tough task in cryptography

Those of us in userland may rarely have to worry about the nuts and bolts of encryption, but they exist nevertheless and must be replaced or updated now and then. 606 more words


Asmcodes: Speck Block Cipher


Speck is a family of lightweight block ciphers publicly released by our friendly National Security Agency (NSA) in June 2013. It’s an ARX (add-rotate-xor) design optimized for performance in software implementations. 558 more words