Skip to content
  • Events
  • Cryptology
  • CyberSecurity
  • Newsletter
  • English
    • 中文 (台灣)
    • English
Secologies Exploring the Security Ecosystem
Secologies Exploring the Security Ecosystem
  • Events
  • Cryptology
  • CyberSecurity
  • Newsletter
  • English
    • 中文 (台灣)
    • English
  • Events
  • Cryptology
  • CyberSecurity
  • Newsletter
  • English
    • 中文 (台灣)
    • English
Events

PQCrypto 2025 Experience

The 2025 PQCrypto conference is being held in Taiwan, and it just so happens that PIs from the Institute of Information Science at Academia Sinica are serving as co-chairs to organize it. Since I have the opportunity, I decided to attend.
Hong-Sheng HuangApr 10, 2025Dec 15, 2025
Academia SINICAConferenceNISTPost Quantum CryptographyPQCrypto
Read More
Cryptology

Perfect Secrecy

When Ralph C. Merkle proposed "Secure Communications Over Insecure Channels" in 1978 (https://dl.acm.org/doi/10.1145/359460.359473), we began to consider the existence of adversaries eavesdropping on our communication channels over the internet, and we started thinking about how to obscure our data
Hong-Sheng HuangJan 26, 2025Dec 1, 2025
Ciphertext SpaceMessage SpacePerfect SecrecyProbability Distribution
Read More
CyberSecurity

Indicators of compromise (IoC)

When collecting malicious APT (Advanced Persistent Threats) incidents, we need some relevant information. Through this information, we can identify specific characteristics or indicators...
Hong-Sheng HuangSep 13, 2024Dec 1, 2025
Cyber SecurityIndicator of Compromise
Read More

DMCA.com Protection Status

  • About the Site
  • About Author
  • Privacy Policy
  • RSS

✉️ [email protected]

Copyright © 2025 Hong-Sheng Huang from Information Security Laboratory