<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyberagentur</provider_name><provider_url>https://www.cyberagentur.de/en/</provider_url><author_name>ML</author_name><author_url>https://www.cyberagentur.de/en/author/ml/</author_url><title>Encrypted Computing 2 - Cyberagentur</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="DAOQkjCJVp"&gt;&lt;a href="https://www.cyberagentur.de/en/tenders/encrypted-computing-2/"&gt;Encrypted Computing 2&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberagentur.de/en/tenders/encrypted-computing-2/embed/#?secret=DAOQkjCJVp" width="600" height="338" title="&#x201C;Encrypted Computing 2&#x201D; &#x2014; Cyberagentur" data-secret="DAOQkjCJVp" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberagentur.de/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>Description The research, development and validation of innovative solutions for new cryptographic techniques that enable computing on encrypted data without knowledge of the plaintext, so that both new relevant use cases can be opened up and already known use cases, which are already theoretically but not yet practically feasible, can also become relevant for practice [&hellip;]</description></oembed>
