Blog

privacy picture

Benchmarking Privacy-Preserving Motion Detection

01/Feb/2021

 Author: Yolan Romailler, Nils Amiet (KUD)

Secure Web Analytics using Functional Encryption

03/Dec/2020

 Author: Norman Scaife (WALLIX)

private image about functional encryption

FENTEC approach: Functional ENcryption as a whole

27/Feb/2020

Author: Marco Lewandowsky and Clément Gentilucci (Flensburg University of Applied Science)

Why encryption is important?

26/Dec/2019

Extended version in Les Echos

Author: Mariem Krichen (Innovation Projects Manager - Wallix)

The era of the IoT revolution and “on Premise” services migration into the Cloud caused the invasion of individuals privacy. Our personal data turned into a booming global market fuel: Data Monetization.

Forget homomorphic encryption, here comes functional encryption

11/Dec/2019

Extended version in Kudelski Security

Author: Yolan Romailler (Kudelski Security)

Have you ever heard of Functional Encryption (FE)? If so, you may be associating it with some sort of homomorphic encryption, which is not wrong, but not exactly right neither.

Authentication under PSD2: man with a credit card and a computer paying online

How does authentication work under the PSD2?

11/Nov/2019

Extended version in Ku Leuven

Author: Danaja Fabčič Povše (KU Leuven)

header image post cryptography

Cracking down on encryption: opening the front door

12/Sep/2019

Collaborative post with Ku Leuven

Author: WIM VANDEVELDE (KU Leuven)

header image post cryptography

Obscure meaning, cryptic messages: cryptography and the law

Author: Danaja FABČIČ POVŠE (KU Leuven)

Cryptography may look like the art of transforming text into unintelligible gibberish, but in a digital society it is absolutely necessary. In very simple terms, cryptography, through the technique called encryption, prevents unauthorised third parties from seeing the original text or information. Instead, they can only access a seemingly random sequence of numbers and letters.

Pages