XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Magazine: Spring 2015 | Volume 21, No. 3

Stay weird, stay different

Inbox

DEPARTMENT: Inbox

Inbox

By XRDS Staff

HTML | In the Digital Library
Tags: General and reference

Alice and Bob in the new world

ACM-W chapters at home and abroad<br />An initiative on women, not of women

Chronicling ciphers

The Ph.D. journey

Computer science faculty careers at liberal arts colleges

COLUMN: Careers

Computer science faculty careers at liberal arts colleges

By Janet Davis, Jeannie Albrecht, Christine Alvarado, Tzu-Yi Chen, Amy Csizmar Dalal, Sohie Lee

HTML | In the Digital Library
Tags: Computing occupations

Exception handling evaluation of large APIs

On the evolution of security bugs

Kristin Lauter on Cryptography and Mathematics

SECTION: Features

Kristin Lauter on Cryptography and Mathematics

There are unique challenges posed by cryptography research. This interview examines potential threats to modern security techniques and how to overcome them.

By Shashank Agrawal, Billy Rathje

HTML | In the Digital Library
Tags: Computability, Computational complexity and cryptography, Computing occupations, Cryptography, Data encryption, Logic, Operating systems security

Fully Homomorphic Encryption: Cryptography's holy grail

Fully Homomorphic Encryption: Cryptography's holy grail

For more than 30 years, cryptographers have embarked on a quest to construct an encryption scheme that would enable arbitrary computation on encrypted data. Conceptually simple, yet notoriously difficult to achieve, cryptography's holy grail opens the door to many new capabilities in our cloud-centric, data-driven world.

By David J. Wu

HTML | In the Digital Library
Tags: Public key (asymmetric) techniques, Public key encryption

Encrypted Search

Encrypted Search

The need to embed search functionality into every aspect of technology has produced an abundance of information that is difficult to secure. Can advances in cryptography resolve the inherent conflicts of big data?

By Seny Kamara

HTML | In the Digital Library
Tags: Computational complexity and cryptography, Cryptography, Data encryption

Secure Your Data and Compute on It, Too

Secure Your Data and Compute on It, Too

Modern cryptography provides techniques to perform useful computations on sensitive data.

By Mike Rosulek

HTML | In the Digital Library
Tags: Computational complexity and cryptography, Cryptography, Data encryption, Operating systems security

Exploring the Risks to Identity Security and Privacy in Cyberspace

Exploring the Risks to Identity Security and Privacy in Cyberspace

Cyberspace, a world of great promise, but also, of great peril. Pirates, predators, and hackers galore, are you and your online identity at risk in this wild frontier?

By Jason R. C. Nurse

HTML | In the Digital Library
Tags: Computer crime, Cryptanalysis and other attacks, Email, Intrusion/anomaly detection and malware mitigation, Operating systems security

The Wrens of Bletchley Park

The Wrens of Bletchley Park

The lives and times of the British women who operated Colossus, and their all-important role in events leading to D-Day and the close of the Second World War.

By Michael Smith

HTML | In the Digital Library
Tags: Computer crime, Cryptanalysis and other attacks, History of computing, Operating systems security

Profile: Ian Pratt<br />Pioneering security through virtualization

Cyber security centre<br />University of Oxford, United Kingdom

Ancient and modern cryptography

Counting stars

DEPARTMENT: Hello world

Counting stars

By Tomaz Hočevar

HTML | In the Digital Library
Tags: Graph theory