Mathematical Limits of Lattices in Cryptography

Nearly all of public-key cryptography relies on the assumed difficulty of solving various number-theoretic problems. Recent spectacular developments in cryptography such as fully homomorphic encryption, candidate multilinear maps, and efficient post-quantum lattice-based cryptography have produced a multitude of new algebraic and number-theoretic cryptographic hardness assumptions. Many of these problems are Read more…

Developing Real-Time Virtualization

Recent years have witnessed two major trends in the development of complex real-time systems. First, they are moving from physically isolated hosts towards common computing platforms shared by multiple systems. Using common platforms can bring significant benefits, including reduced cost and weight, as well as increased flexibility via dynamic resource Read more…

Network Provenance

Operators of distributed systems often find themselves needing to answer a diagnostic or forensic question. Some part of the system is found to be in an unexpected state; for example, a suspicious routing table entry is discovered, or a proxy cache is found to contain an unusually large number of Read more…

Measuring the World’s Well-Being

The World Well-Being Project (WWBP) is pioneering scientific techniques for measuring psychological well-being and physical health based on the analysis of language in social media. As a collaboration between computer scientists, psychologists, and medical researchers, we are shedding new light on the psychosocial processes that affect health and happiness and Read more…