Advertisement

Research and Advances

Where Did I Leave My Keys?: Lessons from the Juniper Dual EC Incident

In this paper, we describe the results of a full independent analysis of the ScreenOS randomness and VPN key establishment protocol subsystems, which we carried out in response to the Juniper Dual Elliptic Curve incident.
Opinion

The Peace of Westphalia

A look at today's headlines suggests the transnational Internet and World Wide Web have become avenues through which the Peace of Westphalia agreement is regularly violated.
Opinion

Move Fast and Break Things

Whether or not the theory of disruptive innovation has predictive power, it is a powerful story that explains the rise and fall of tech empires. It is deeply embedded in the psyche of Silicon Valley.

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More