Articles Tagged: Computational complexity and cryptography
Articles & Features
SECTION: Features
Kristin Lauter on Cryptography and Mathematics
There are unique challenges posed by cryptography research. This interview examines potential threats to modern security techniques and how to overcome them.
By Shashank Agrawal, Billy Rathje, March 2015
Encrypted Search
The need to embed search functionality into every aspect of technology has produced an abundance of information that is difficult to secure. Can advances in cryptography resolve the inherent conflicts of big data?
By Seny Kamara, March 2015
Secure Your Data and Compute on It, Too
Modern cryptography provides techniques to perform useful computations on sensitive data.
By Mike Rosulek, March 2015
SECTION: Features
Something Bad Might Happen: Lawyers, anonymization and risk
The line between personal and anonymous information is often unclear. Increasingly it falls to lawyers to understand and manage the risks associated with the sharing of "anonymized" data sets.
By Marion Oswald, September 2013
Personal, Pseudonymous, and Anonymous Data: The problem of identification
Why defining what counts as personal data is important for data protection and information sharing.
By Iain Bourne, September 2013
The Tor Project: An inside view
A decade since the first version was released, Tor continues to be at the center of the debate around online privacy.
By Kelley Misata, September 2013
It's Not About Winning, it's About Sending a Message: Hiding information in games
New information hiding techniques use online games to transmit secrets covertly. The technique is simple, but the problem of detecting these covert channels is far from solved.
By Philip C. Ritchey, September 2013
DEPARTMENT: Blogs
The XRDS Blog
The newly launched XRDS blog highlights a range of topics from conference overviews to privacy and security, from HCI to cryptography. Selected blog posts, edited for print, will be featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety.
By Wolfgang Richter, Dimitris Mitropoulos, December 2012
SECTION: Features
Big privacy
Approaches from computer science and statistical science for assessing and protecting privacy in large, public data sets.
By Ashwin Machanavajjhala, Jerome P. Reiter, September 2012
Invitation to complexity theory
Complexity theory provides new viewpoints on various phenomena that were considered by past thinkers.
By Oded Goldreich, March 2012
Pseudorandomness and derandomization
The computational theory of pseudorandomness and cryptography.
By Luca Trevisan, March 2012
SECTION: Features
Games for extracting randomness
Two computer scientists have created a video game about mice and elephants that can make computer encryption properly secure---as long as you play it randomly.
By Ran Halprin, Moni Naor, December 2010
Introduction
By Justin Solomon, September 2008
Data encryption
By Ed DeHart, September 2008
Introduction
By William Stevenson, May 2005
An introduction to quantum cryptography
By Nick Papanikolaou, May 2005
Obfuscation of the standard XOR Encryption algorithm
By Zachary A. Kissel, May 2005
Protecting the integrity of agents
By Michael J. Grimley, Brian D. Monroe, June 1999