Tag: hardware security modules
-
CSA: Assessing the Security of FHE Solutions
Source URL: https://cloudsecurityalliance.org/blog/2025/03/19/assessing-the-security-of-fhe-solutions Source: CSA Title: Assessing the Security of FHE Solutions Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses Fully Homomorphic Encryption (FHE), emphasizing its critical role in enhancing data privacy and security, particularly for data-in-use scenarios. It provides insights into evaluating FHE solutions, focusing on mathematical security guarantees, trust factors,…
-
Cloud Blog: Announcing quantum-safe digital signatures in Cloud KMS
Source URL: https://cloud.google.com/blog/products/identity-security/announcing-quantum-safe-digital-signatures-in-cloud-kms/ Source: Cloud Blog Title: Announcing quantum-safe digital signatures in Cloud KMS Feedly Summary: The continued advancement of experimental quantum computing has raised concerns about the security of many of the world’s widely-used public-key cryptography systems. Crucially, there exists the potential for sufficiently large, cryptographically-relevant quantum computers to break these algorithms. This potential…
-
The Register: Microsoft unveils beefy custom AMD chip to crunch HPC workloads on Azure
Source URL: https://www.theregister.com/2024/11/20/microsoft_azure_custom_amd/ Source: The Register Title: Microsoft unveils beefy custom AMD chip to crunch HPC workloads on Azure Feedly Summary: In-house DPU and HSM silicon also shown off Ignite One of the advantages of being a megacorp is that you can customize the silicon that underpins your infrastructure, as Microsoft is demonstrating at this…
-
Hacker News: HashML-DSA Considered Harmful
Source URL: https://keymaterial.net/2024/11/05/hashml-dsa-considered-harmful/ Source: Hacker News Title: HashML-DSA Considered Harmful Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the complexities surrounding prehashing in digital signature schemes, particularly in the context of recent NIST standards. It offers insights on how to effectively manage private key exposure while facilitating remote signing processes, highlighting…
-
Cloud Blog: You can now sign Microsoft Windows artifacts with keys protected by Cloud HSM
Source URL: https://cloud.google.com/blog/products/identity-security/you-can-now-sign-microsoft-windows-artifacts-with-keys-protected-by-cloud-hsm/ Source: Cloud Blog Title: You can now sign Microsoft Windows artifacts with keys protected by Cloud HSM Feedly Summary: To build trust in the software world, developers need to be able to digitally sign their code and attest that the software their customers are downloading is legitimate and hasn’t been maliciously altered.…