Featured Insights

Latest Insights

Attacks and defenses in post-quantum cryptography: case of lattices.

In the digital age, where every online interaction, from messaging to financial transactions, hinges on the assurance of security, the role of cryptography cann [...]
Published by : Najwa Aaraj

The Exipnos Era: Striking a Balance between Searchability and Security

We have come a long way since the invention of cathode-ray tubes, magnetic drums, tape drives, and, for the older millennials out there, hard-disk drives. Colle [...]
Published by : Najwa Aaraj , Chiara Marcolla , Xiaojie Zhu
inbox icon

Get the latest insights from TII in your inbox

CAPTCHA