Today we’re going to talk about how to keep information secret, and this isn’t a new goal. We’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard ...
In 2018, Aayush Jain, a graduate student at the University of California, Los Angeles, traveled to Japan to give a talk about a powerful cryptographic tool he and his colleagues were developing. As he ...
The method was called “indistinguishability obfuscation,” or IO. The authors touted it as a “central hub” for all of cryptography—a unified basis upon which to reconstruct familiar cryptographic tools ...
Quantum computers are coming. And when they arrive, they are going to upend the way we protect sensitive data. Unlike classical computers, quantum computers harness quantum mechanical effects — like ...
Report Details Risks and Benefits of Developing a Practical Quantum Computer, Identifies Metrics for Tracking Progress WASHINGTON – Given the current state of quantum computing and the significant ...
Researchers identified a problem that holds the key to whether all encryption can be broken -- as well as a surprising connection to a mathematical concept that aims to define and measure randomness.
CISPA-Faculty Prof. Dr. Cas Cremers has been awarded the Levchin Prize for Real-World Cryptography. Cremers receives this honor together with his collaborators Prof. Dr. David Basin (ETH Zurich), Prof ...
As computer scientists tackle a greater range of problems, their work has grown increasingly interdisciplinary. This year, many of the most significant computer science results also involved other ...
Computers are all around us. How does this affect the world we live in? This course is a broad introduction to computing technology for humanities and social science students. Topics will be drawn ...
Faculty members in the department are actively engaged in research in the areas listed below. There are many opportunities for both undergraduate and graduate students to participate in these ...