PRISMACLOUD

Blog Standard

Rasta: A cipher with low ANDdepth and few ANDs per bit

Recent developments in multi party computation (MPC) and fully homomorphic encryption (FHE) promoted the design and analysis of symmetric cryptographic schemes that minimize multiplications in one way or another. In this paper, we propose with Rasta a design strategy...

Details

Providing secure mechanisms to protect personal data in a mobility platform

Security and privacy preserving methods need to be developed to facilitate cloud usage even for organisations dealing with sensitive information and maintaining security critical services. A reasonable way to achieve the required security properties for outsourced data storage and...

Details

Developing the IT security solutions of tomorrow

At Infosecurity Europe 2018, AIT is showcasing its portfolio of cryptographic solutions for the cloud. Developed over recent years together with industry partners like Atos, IBM, Interoute and Etra, these solutions are driven by the increased need for security...

Details

D8.2 Smart City use case validation

Contributing Partners ETRA, MPL Executive Summary PRISMACLOUD demonstrators make use of the RTD results in order to test, assess and validate the whole project outcomes. The software components developed to build the PRISMACLOUD cloud services are now integrated to...

Details

D8.3 E-Government use case validation

Contributing Partners LISPA, UNEW Executive Summary  PRISMACLOUD demonstrators make use of the RTD results in order to test, assess and validate the whole project outcomes. The software components developed to build the PRISMACLOUD cloud services are now integrated to...

Details

ISO SC27 meeting in Wuhan, China

In the week from 16 to 20 April 2018, PRISMACLOUD attended the 26th meeting of the ISO SC27 "IT-Security Techniques" in Wuhan, China. We are having two active liaisons with SC27 working groups WG2 "Cryptography and Security Mechanisms" and...

Details

Engineering Cryptography for Security and Privacy in the Cloud

We published an article in ERCIM News Magazine No. 113 April 2018, titled "Engineering Cryptography for Security and Privacy in the Cloud". The article can be found in ERCIM News No. 113 online edition  

Details

Best Paper Award Nomination

In this year’s DATE (ACM/IEEE/EDAA Design Automation and Test in Europe) conference the submission “A Fast and Resource Efficient FPGA Implementation of Secret Sharing for Storage Applications” by Jakob Stangl, Thomas Lorünser, and Sai Manoj Pudukotai Dinakarrao has made...

Details

A Fast and Resource Efficient FPGA Implementation of Secret Sharing for Storage Applications

Title A Fast and Resource Efficient FPGA Implementation of Secret Sharing for Storage Applications Authors Jakob Stangl (TU Wien) , Thomas Lorünser (AIT Austrian Institute of Technology), Sai Dinakarrao (TU Wien) Abstract Outsourcing data into the cloud gives wide benefits...

Details

Highly-Efficient Fully-Anonymous Dynamic Group Signatures

Group signatures are a central tool in privacy-enhancing cryptography, which allow members of a group to anonymously produce signatures on behalf of the group. Consequently, they are an attractive means to implement privacy-friendly authentication mechanisms. Ideally, group signatures are...

Details

Element

Become a Member


Continue