XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Magazine: Current Issue

Current Issue

Stay weird, stay different

DEPARTMENT: Letter from the editors

Stay weird, stay different

By Sean Follmer

HTML | In the Digital Library
Tags: General, Professional Ethics

Inbox

DEPARTMENT: Inbox

Inbox

By XRDS Staff

HTML | In the Digital Library
Tags: MISCELLANEOUS

Alice and Bob in the new world

ACM-W chapters at home and abroad<br />An initiative on women, not of women

Chronicling ciphers

The Ph.D. journey

Computer science faculty careers at liberal arts colleges

COLUMN: Careers

Computer science faculty careers at liberal arts colleges

By Janet Davis, Jeannie Albrecht, Christine Alvarado, Tzu-Yi Chen, Amy Csizmar Dalal, Sohie Lee

HTML | In the Digital Library
Tags: Occupations

Exception handling evaluation of large APIs

On the evolution of security bugs

Kristin Lauter on Cryptography and Mathematics

SECTION: Features

Kristin Lauter on Cryptography and Mathematics

There are unique challenges posed by cryptography research. This interview examines potential threats to modern security techniques and how to overcome them.

By Shashank Agrawal, Billy Rathje

HTML | In the Digital Library
Tags: Mathematical Logic, Occupations, Security and Protection

Fully Homomorphic Encryption: Cryptography's holy grail

FREE CONTENT FEATURE

Fully Homomorphic Encryption: Cryptography's holy grail

For more than 30 years, cryptographers have embarked on a quest to construct an encryption scheme that would enable arbitrary computation on encrypted data. Conceptually simple, yet notoriously difficult to achieve, cryptography's holy grail opens the door to many new capabilities in our cloud-centric, data-driven world.

By David J. Wu

HTML | In the Digital Library
Tags: Public key cryptosystems

Encrypted Search

FREE CONTENT FEATURE

Encrypted Search

The need to embed search functionality into every aspect of technology has produced an abundance of information that is difficult to secure. Can advances in cryptography resolve the inherent conflicts of big data?

By Seny Kamara

HTML | In the Digital Library
Tags: DATA ENCRYPTION

Secure Your Data and Compute on It, Too

Secure Your Data and Compute on It, Too

Modern cryptography provides techniques to perform useful computations on sensitive data.

By Mike Rosulek

HTML | In the Digital Library
Tags: Cryptographic controls

Exploring the Risks to Identity Security and Privacy in Cyberspace

Exploring the Risks to Identity Security and Privacy in Cyberspace

Cyberspace, a world of great promise, but also, of great peril. Pirates, predators, and hackers galore, are you and your online identity at risk in this wild frontier?

By Jason R. C. Nurse

HTML | In the Digital Library
Tags: Electronic mail, Security and Protection, Unauthorized access

The Wrens of Bletchley Park

The Wrens of Bletchley Park

The lives and times of the British women who operated Colossus, and their all-important role in events leading to D-Day and the close of the Second World War.

By Michael Smith

HTML | In the Digital Library
Tags: Code breaking, Security and Protection

Ian Pratt: Pioneering security through virtualization

Cyber security centre<br />University of Oxford, United Kingdom

Ancient and modern cryptography

Counting stars

COLUMN: Hello world

Counting stars

By Tomaz Hočevar

HTML | In the Digital Library
Tags: Graph Theory, Graphs and networks