Charting a path to a more sustainable AI futureResearchMike Murphy18 Nov 2024AI HardwareSemiconductors
Managing cryptography with CBOMkitTechnical noteNicklas Körtge, Gero Dittmann, and Silvio Dragone06 Nov 2024CryptographyQuantum SafeSecurity
NIST’s post-quantum cryptography standards are hereNewsMichael Osborne, Katia Moskvitch, and Jennifer Janechek13 Aug 2024CryptographyQuantum SafeSecurity
How a scientist’s lifelong love of puzzles led to cryptography that could help quantum-proof the worldDeep DiveKatia Moskvitch18 Jun 2024CryptographyQuantum Safe
Expanding the quantum-safe cryptography toolboxNewsWard Beullens and Luca De Feo18 Jul 2023CryptographyQuantumQuantum Safe
Federated Learning meets Homomorphic EncryptionTechnical noteNathalie Baracaldo and Hayim Shaul16 Dec 2022AICryptographyDistributed SystemsFully Homomorphic Encryption
IBM’s Cryptography Bill of Materials to speed up quantum-safe assessmentNewsAlessandro Curioni and Michael Osborne08 Dec 2022CryptographyQuantum SafeSecurity
Breaking Rainbow takes a weekend on a laptopTechnical noteWard Beullens13 Oct 2022CryptographyQuantum SafeSecurity
How we quantum-proofed IBM z16 Case studySilvio Dragone11 Oct 2022CryptographyQuantumQuantum SafeSecurity
How IBM is helping make the world’s networks quantum safeNewsRay Harishankar29 Sep 2022CryptographyQuantum SafeSecurity
The cryptography standards that will keep today’s data and systems quantum safeNews22 Sep 2022CryptographyQuantumQuantum SafeSecurity
Why it’s time to take quantum-safe cryptography seriouslyExplainerScott Crowder, Charles Robinson, and Ray Harishankar26 Jul 2022CryptographyQuantumQuantum SafeSecurity
What is confidential computing?ExplainerDaniele Buono, James Bottomley, Hubertus Franke, and Robert Senger25 Jul 2022Cloud SecurityConfidential ComputingCryptographyHybrid Cloud
IBM scientists help develop NIST’s quantum-safe standardsNewsMichael Osborne and Vadim Lyubashevsky06 Jul 2022CryptographyQuantumQuantum SafeSecurity
New crypto techniques protect passwords from unreliable doorkeepersExplainerJulia Hesse24 Nov 20217 minute readCryptographySecurity