XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Cryptography

Articles & Features

SECTION: Features

How to fix email: making communication encrypted and decentralized with autocrypt

Email has been declared dead many times but refuses to die. There is a new effort underway to make encrypted end-to-end email communication as automatic as possible. It is part of a diverse set of efforts to reinvigorate the email ecosystem, which remains a crucial cornerstone of a functioning, open internet.

By Holger Krekel, Karissa McKelvey, Emil Lefherz, July 2018

PDF | HTML | In the Digital Library

Toward computing over encrypted data in IoT systems

FEATURE: Features

Toward computing over encrypted data in IoT systems

The multitude of IoT devices contributes to the enormous amount of data stored on corporate clouds. Yet the level of computing power has outpaced advances in privacy protection. Could encrypted search preserve the privacy of data, while utilizing the computing power of the cloud?

By Hossein Shafagh, December 2015

PDF | HTML | In the Digital Library

Alice and Bob in the new world

COLUMN: INIT

Alice and Bob in the new world

By Shashank Agrawal, March 2015

PDF | HTML | In the Digital Library

Kristin Lauter on Cryptography and Mathematics

SECTION: Features

Kristin Lauter on Cryptography and Mathematics

There are unique challenges posed by cryptography research. This interview examines potential threats to modern security techniques and how to overcome them.

By Shashank Agrawal, Billy Rathje, March 2015

PDF | HTML | In the Digital Library

Encrypted Search

Encrypted Search

The need to embed search functionality into every aspect of technology has produced an abundance of information that is difficult to secure. Can advances in cryptography resolve the inherent conflicts of big data?

By Seny Kamara, March 2015

PDF | HTML | In the Digital Library

Secure Your Data and Compute on It, Too

Secure Your Data and Compute on It, Too

Modern cryptography provides techniques to perform useful computations on sensitive data.

By Mike Rosulek, March 2015

PDF | HTML | In the Digital Library

Ancient and modern cryptography

DEPARTMENT: Back

Ancient and modern cryptography

By Finn Kuusisto, March 2015

PDF | HTML | In the Digital Library

Keeping Your Little Back Shop

COLUMN: INIT

Keeping Your Little Back Shop

By Maire Byrne-Evans, Christine Task, September 2013

PDF | HTML | In the Digital Library

Something Bad Might Happen: Lawyers, anonymization and risk

SECTION: Features

Something Bad Might Happen: Lawyers, anonymization and risk

The line between personal and anonymous information is often unclear. Increasingly it falls to lawyers to understand and manage the risks associated with the sharing of "anonymized" data sets.

By Marion Oswald, September 2013

PDF | HTML | In the Digital Library

Personal, Pseudonymous, and Anonymous Data: The problem of identification

Personal, Pseudonymous, and Anonymous Data: The problem of identification

Why defining what counts as personal data is important for data protection and information sharing.

By Iain Bourne, September 2013

PDF | HTML | In the Digital Library

The Tor Project: An inside view

The Tor Project: An inside view

A decade since the first version was released, Tor continues to be at the center of the debate around online privacy.

By Kelley Misata, September 2013

PDF | HTML | In the Digital Library

It's Not About Winning, it's About Sending a Message: Hiding information in games

It's Not About Winning, it's About Sending a Message: Hiding information in games

New information hiding techniques use online games to transmit secrets covertly. The technique is simple, but the problem of detecting these covert channels is far from solved.

By Philip C. Ritchey, September 2013

PDF | HTML | In the Digital Library

The XRDS Blog

DEPARTMENT: Blogs

The XRDS Blog

The newly launched XRDS blog highlights a range of topics from conference overviews to privacy and security, from HCI to cryptography. Selected blog posts, edited for print, will be featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety.

By Wolfgang Richter, Dimitris Mitropoulos, December 2012

PDF | HTML | In the Digital Library

Big privacy

SECTION: Features

Big privacy

Approaches from computer science and statistical science for assessing and protecting privacy in large, public data sets.

By Ashwin Machanavajjhala, Jerome P. Reiter, September 2012

PDF | HTML | In the Digital Library

Invitation to complexity theory

Invitation to complexity theory

Complexity theory provides new viewpoints on various phenomena that were considered by past thinkers.

By Oded Goldreich, March 2012

PDF | HTML | In the Digital Library

Pseudorandomness and derandomization

The computational theory of pseudorandomness and cryptography.

By Luca Trevisan, March 2012

PDF | HTML | In the Digital Library

Bletchley Park<br />Milton Keynes, UK

DEPARTMENT: Labz

Bletchley Park
Milton Keynes, UK

By Vaggelis Giannikas, March 2012

PDF | HTML | In the Digital Library

Games for extracting randomness

SECTION: Features

Games for extracting randomness

Two computer scientists have created a video game about mice and elephants that can make computer encryption properly secure---as long as you play it randomly.

By Ran Halprin, Moni Naor, December 2010

PDF | HTML | In the Digital Library

Introduction

By Justin Solomon, September 2008

PDF | HTML | In the Digital Library

Data encryption

By Ed DeHart, September 2008

PDF | HTML | In the Digital Library

Introduction

By William Stevenson, May 2005

PDF | HTML | In the Digital Library

Timing attacks on RSA

By Wing H. Wong, May 2005

PDF | HTML | In the Digital Library

Protecting the integrity of agents

By Michael J. Grimley, Brian D. Monroe, June 1999

PDF | HTML | In the Digital Library