Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- opinionJuly 2024
Zero-Knowledge Proofs and Their Role within the Blockchain
Communications of the ACM (CACM), Volume 67, Issue 7July 2024, Pages 6–7https://doi.org/10.1145/3653478In each issue of Communications, we publish selected posts or excerpts from the many blogs on our website. The views expressed by bloggers are their own and not necessarily held by Communications or the Association for Computing Machinery.
Read more ...
- opinionJune 2024ONLINE FIRST
- newsMay 2024
A Life of Complexity
Communications of the ACM (CACM), Volume 67, Issue 6June 2024, Pages 14–16https://doi.org/10.1145/3656578Following his parents' advice on going to university led Avi Wigderson to the ACM A.M. Turing Award.
- opinionMay 2024ONLINE FIRST
- opinionFebruary 2024
Verifying Correctness
Communications of the ACM (CACM), Volume 67, Issue 3March 2024, Pages 108–ffhttps://doi.org/10.1145/3639575Yael Tauman Kalai on her career, proof systems, and certifying correctness.
-
- opinionFebruary 2024
- research-articleFebruary 2024
Indistinguishability Obfuscation from Well-Founded Assumptions
Communications of the ACM (CACM), Volume 67, Issue 3March 2024, Pages 97–105https://doi.org/10.1145/3611095At least since the initial public proposal of public-key cryptography based on computational hardness conjectures, cryptographers have contemplated the possibility of a "one-way compiler" that translates computer programs into "incomprehensible" but ...
- opinionJanuary 2024
- research-articleOctober 2023
Uncloneable Cryptography
Communications of the ACM (CACM), Volume 66, Issue 11November 2023, Pages 78–86https://doi.org/10.1145/3576897In memory of Stephen Wiesner, 1942--2021.
- articleJune 2023
Outsmarting Deepfake Video
Communications of the ACM (CACM), Volume 66, Issue 7July 2023, Pages 18–19https://doi.org/10.1145/3595958Looking for truth, when "it's becoming surprisingly easy to distort reality."
- research-articleMay 2023
On the (In)Security of ElGamal in OpenPGP
Communications of the ACM (CACM), Volume 66, Issue 6June 2023, Pages 107–115https://doi.org/10.1145/3592835Roughly four decades ago, Taher ElGamal put forward what is today one of the most widely known and best understood public key encryption schemes. ElGamal encryption has been used in many different contexts, chiefly among them by the OpenPGP email ...
- research-articleApril 2023
Unlocking the Potential of Fully Homomorphic Encryption
Communications of the ACM (CACM), Volume 66, Issue 5May 2023, Pages 72–81https://doi.org/10.1145/3572832Exploring the transformational potential of FHE and the path toward adoption of its "stack."
- articleJanuary 2023
Post-Quantum Cryptography
Communications of the ACM (CACM), Volume 66, Issue 2February 2023, Pages 15–17https://doi.org/10.1145/3575664Cryptographers seek algorithms quantum computers cannot break.
- articleDecember 2022
The Outlook for Crypto
Communications of the ACM (CACM), Volume 66, Issue 1January 2023, Pages 16–18https://doi.org/10.1145/3570520Can cryptocurrencies cut their environmental impact?
- columnOctober 2022
- research-articleJune 2022
The keys to the kingdom
Communications of the ACM (CACM), Volume 65, Issue 7July 2022, Pages 38–41https://doi.org/10.1145/3511664A deleted private key, a looming deadline, and a last chance to patch a new static root of trust into the bootloader.
- research-articleMay 2021
Toward confidential cloud computing
- Mark Russinovich,
- Manuel Costa,
- Cédric Fournet,
- David Chisnall,
- Antoine Delignat-Lavaud,
- Sylvan Clebsch,
- Kapil Vaswani,
- Vikas Bhatia
Communications of the ACM (CACM), Volume 64, Issue 6June 2021, Pages 54–61https://doi.org/10.1145/3453930Extending hardware-enforced cryptographic protection to data while in use.
- research-articleNovember 2020
Security analysis of SMS as a second factor of authentication
Communications of the ACM (CACM), Volume 63, Issue 12December 2020, Pages 46–52https://doi.org/10.1145/3424260The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping.