Magazine: Spring 2015 | Volume 21, No. 3
The Spring issue of XRDS features contributions from the who’s who of cryptography. Within are a range of articles from the early beginnings of cryptography through present-day research. Discover modern cryptographic techniques like searchable encryption, read interviews with leading researchers in the field, and enjoy a wonderful look back at Bletchley Park, home of Colossus (the world’s first electronic digital computer).
Download
- Digital Edition web-based magazine available for subscribers – sign in
- PDF via ACM’s Digital Library
DEPARTMENT: Updates
ACM-W chapters at home and abroad
An initiative on women, not of women
By Claudia Schulz
COLUMN: Careers
Computer science faculty careers at liberal arts colleges
By Janet Davis, Jeannie Albrecht, Christine Alvarado, Tzu-Yi Chen, Amy Csizmar Dalal, Sohie Lee
On the evolution of security bugs
By Dimitris Mitropoulos
SECTION: Features
Kristin Lauter on Cryptography and Mathematics
There are unique challenges posed by cryptography research. This interview examines potential threats to modern security techniques and how to overcome them.
By Shashank Agrawal, Billy Rathje
Fully Homomorphic Encryption: Cryptography's holy grail
For more than 30 years, cryptographers have embarked on a quest to construct an encryption scheme that would enable arbitrary computation on encrypted data. Conceptually simple, yet notoriously difficult to achieve, cryptography's holy grail opens the door to many new capabilities in our cloud-centric, data-driven world.
By David J. Wu
Encrypted Search
The need to embed search functionality into every aspect of technology has produced an abundance of information that is difficult to secure. Can advances in cryptography resolve the inherent conflicts of big data?
By Seny Kamara
Secure Your Data and Compute on It, Too
Modern cryptography provides techniques to perform useful computations on sensitive data.
By Mike Rosulek
Exploring the Risks to Identity Security and Privacy in Cyberspace
Cyberspace, a world of great promise, but also, of great peril. Pirates, predators, and hackers galore, are you and your online identity at risk in this wild frontier?
By Jason R. C. Nurse
The Wrens of Bletchley Park
The lives and times of the British women who operated Colossus, and their all-important role in events leading to D-Day and the close of the Second World War.
By Michael Smith
Profile: Ian Pratt
Pioneering security through virtualization
By Adrian Scoică