Build an Homomorphic Encryption Scheme from Scratch with Python

This blog post aims at explaining the basic mathematical concepts behind most of today’s homomorphic encryption (HE) schemes, and then build upon this to implement our own scheme (similar to BFV) from scratch using Python.

Homomorphic Encryption Types

A previous post introduced homomorphic encryption (HE) and the challenges of applying it to deep learning. This post will dig into the three main types of HE schemes. We will first introduce the notion of a circuit, so that we can describe the properties of each type and differentiate between them.

Introduction to Homomorphic Encryption

This is the first of a series of blog posts about the use of homomorphic encryption for deep learning. Here I introduce the basics and terminology as well as link to external resources that might help with a deeper understanding of the topic.

CSAW'19 CTF Finals Writeup - Sharing is Caring

Cyber Security Awareness Worldwide is the most comprehensive student-run cyber security event in the world, featuring nine competitions, 6 global hosts, workshops, and industry events.

CSAW'19 CTF Quals Writeup - Fault Box

Cyber Security Awareness Worldwide is the most comprehensive student-run cyber security event in the world, featuring nine competitions, 6 global hosts, workshops, and industry events.

Understanding the Basics of Reinforcement Learning

We will start with the story of Agent-S, someone that never went to the beach before, one day he was put into the center of the ocean, he doesn’t have any prior knowledge of how to swim, but he is scary…

Hack PySyft - Find Bugs Before the Malicious Guys

On July 31st, 2019, Trask launched the Hack PySyft initiative, saying ‘Some day, when PySyft is deployed in production around the world, someone evil is going to try to hack PySyft and steal personal data…

MCTF Final 2019 Writeup - Back to the Old Ways

There is a group of hackers that we’ve been trying to take down for a while, we had a spy among them but his cover was compromised, but he managed to leak a piece of code…

Feature Extraction and Detection of Malwares Using Machine Learning

Malicious softwares, or malwares in short, represent a growing threat on the information systems worldwide. Throughout years cyber-security specialists have been using…

Tackle Today's IT Challenges with Docker

In the IT world, a software product generally goes through a Software Supply Chain, which is basically all the processes and methods used to deliver that product to the customers…