Category Archives: Crittografia

War and cryptography: the challenge of quantum communication

War and cryptography: the challenge of quantum communication

Message encryption has always been a very important tool within the military, stretching back to the time of the ancient Greeks to the present day. It is natural for two armies in war to seek information about each other, both to learn about enemy strategies before battle, as well as to discover its movements during it. In order to obtain this information, “cryptoanalysis” was born, that is the study of decrypting encrypted messages without knowing their encryption key. It is easy to assume that if an army, through cryptoanalysis, manages to decipher the enemy’s communications, it can gain a fundamental strategic advantage. To be precise, it must be specified that […]

Seminar – “An introduction to secure multi – party computation”

Seminar – “An introduction to secure multi – party computation”

Telsy seminar of Giuseppe D’Alconzo entitled : ‘’ An introduction to secure multi – party computation’’ The seminar, organized with The Polytechnic University of Turin, will be held on Monday 15 July at 14.30 PM in Polytechnic’s Aula Buzano – Dipartimento di Scienze Matematiche Abstract: Secure Multi Party Computation (MPC) is a branch of cryptography that allows a set of players to evaluate a public function on private inputs, revealing no information about them apart from the computed output. It is an alternative to the strong assumption of the existence of a trusted party. It was born in the 1980s as a theoretical and not so treatable field for its computational […]

Seminario Prof. Desmedt, 1 luglio 2019

Seminario del Professor Yvo Desmedt dal titolo Private and reliable communication with untrusted components Il seminario, organizzato da Telsy in collaborazione con il Politecnico di Torino, si terrà lunedì 1 luglio 2019 alle ore 14 presso l’aula 7 del DISMA del Politecnico, Corso Duca degli Abruzzi 24, Torino. Abstract:Due to the US boycott of Huawei that started in August, 2018, the (in)security of network components is in the spotlight. This problem is not unique to modern telecommunication networks, but one can also have untrusted couriers. This was demonstrated recently by FedEx when two packages containing Huawei documents, being shipped to China from Japan, were diverted to the U.S. without authorization. […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close