XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Public key (asymmetric) techniques

Articles & Features

Fully Homomorphic Encryption: Cryptography's holy grail

SECTION: Features

Fully Homomorphic Encryption: Cryptography's holy grail

For more than 30 years, cryptographers have embarked on a quest to construct an encryption scheme that would enable arbitrary computation on encrypted data. Conceptually simple, yet notoriously difficult to achieve, cryptography's holy grail opens the door to many new capabilities in our cloud-centric, data-driven world.

By David J. Wu, March 2015

PDF | HTML | In the Digital Library

What is Bitcoin?

What is Bitcoin?

Strengths and weaknesses of the leader in a new generation of emerging cryptocurrencies.

By Dominic Hobson, September 2013

PDF | HTML | In the Digital Library

Profile Dickie George<br />looking back on 40 years at the NSA

Timing attacks on RSA

By Wing H. Wong, May 2005

PDF | HTML | In the Digital Library

Public key cryptography

By Pradosh Kumar Mohapatra, September 2000

PDF | HTML | In the Digital Library