PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 42Mar 42
PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
Prof Bill Buchanan OBE FRSESpeeding Up Fully Homomorphic EncryptionLike machine learning, much of our existing Fully Homomorphic Encryption (FHE) methods use vector and matrix operations. Unfortunately, our…8h ago8h ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceMixing Oil and Vinegar Works in a Post-Quantum WorldDilithium (aka ML-DSA — FIPS 204), Falcon, and SPHINCS+ (aka SLH-DSA — FIPS 205) have been approved for the NIST PQC standardisation. Now…14h ago14h ago
Prof Bill Buchanan OBE FRSEHidding Attributes in ABE: DIPPE (Decentralized Inner-Product Predicate Encryption)With Attribute-Based Encryption (ABE) [2], we allow users with certain attributes to decrypt data. This might relate to their location or…2d ago2d ago
Prof Bill Buchanan OBE FRSEMAABE: Multi-Authority Attribute-Based Encryption schemeLast week, I spoke with Brent Waters, who is the co-inventor of ABE [1]:3d ago3d ago
Prof Bill Buchanan OBE FRSEFAME and Enhanced Attributed-Based SecurityWith CP-ABE (Cipher Policy — Attributed-Based Encryption), we can generate an encryption key based on a policy and a set of attributes…3d ago13d ago1
Prof Bill Buchanan OBE FRSETowards Zero Trust and Attribute-Based EncryptionOverall, in cybersecurity, we need to realise that role-based access security (RBAC) is often not a sensible solution for protecting data…4d ago44d ago4
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceHigh-Performance Computing and Crypto CrackingYesterday, Elias Ekonomou posted this challenge:5d ago5d ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceCreating Collisions and ChatGPTSo, when you get a crypto challenge, as a cybersecurity professional, it is your honour to crack it:5d ago15d ago1