{"id":3188,"date":"2024-08-08T19:12:18","date_gmt":"2024-08-08T17:12:18","guid":{"rendered":"https:\/\/www.cyberagentur.de\/tenders\/encrypted-computing-2\/"},"modified":"2026-04-28T11:07:59","modified_gmt":"2026-04-28T09:07:59","slug":"encrypted-computing-2","status":"publish","type":"tender","link":"https:\/\/www.cyberagentur.de\/en\/tenders\/encrypted-computing-2\/","title":{"rendered":"Encrypted Computing 2"},"content":{"rendered":"  <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n<h3 class=\"wp-block-heading has-text-align-left\">Description<\/h3>\n\n<p>The research, development and validation of innovative solutions for new cryptographic techniques that enable computing on encrypted data without knowledge of the plaintext, so that both new relevant use cases can be opened up and already known use cases, which are already theoretically but not yet practically feasible, can also become relevant for practice through a significant gain in performance.<br\/><br\/>The client invites potential participants from science and research as well as companies and freelancers to answer up to four research questions (research areas) through pre-commercial procurement, for which they can submit bids. Each of these research questions is formulated in a technology-open manner, i.e. the participants can decide for themselves which technology they consider to be expedient for the respective research question. <br\/><br\/>The most important technical challenges that need to be overcome in concrete terms include The algorithmic acceleration of suitable cryptographic procedures, the precise tailoring of cryptographic protocols to relevant use cases, and the validation of results while maintaining a consistently high level of security during data processing.<\/p>\n\n<h3 class=\"wp-block-heading has-text-align-left\">Deadline for the submission of requests to participate<\/h3>\n\n<p><strong>06.11.2023, 10:00 a.m.,<\/strong> via <a href=\"https:\/\/www.evergabe-online.de\/\" target=\"_blank\" rel=\"noreferrer noopener\">www.evergabe-online.de <\/a>or directly  <a href=\"https:\/\/www.evergabe-online.de\/tenderdetails.html?0&amp;id=535910\" target=\"_blank\" rel=\"noreferrer noopener\">www.evergabe-online.de\/tenderdetails.html?0&amp;id=535910 <\/a><\/p>\n\n<p><strong>Client: <\/strong>Agentur f\u00fcr Innovation in der Cybersicherheit GmbH<br\/><strong>Awarding body: <\/strong>Agentur f\u00fcr Innovation in der Cybersicherheit GmbH<br\/><strong>Services and products:<\/strong> Research and development services and related consulting<br\/><strong>Tender scope:<\/strong> Europe-wide<br\/><strong>Procurement procedure:<\/strong> Pre-commercial procurement<br\/><strong>Type of award: <\/strong>Negotiated procedure<br\/><strong>Place of fulfillment:<\/strong> Halle (Saale), district-free city<br\/><strong>Contact: <\/strong>only via <a href=\"mailto:ve&#114;ga&#98;e&#64;cy&#98;er&#97;&#103;en&#116;&#117;r&#46;&#100;&#101;\">&#118;e&#114;ga&#98;est&#101;ll&#101;&#64;&#99;ybe&#114;&#97;&#103;&#101;n&#116;u&#114;.&#100;&#101;<\/a><br\/><strong>Contract notice number: <\/strong>2023\/S 171-537366<br\/><strong>CPV code:<\/strong> 73100000<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description The research, development and validation of innovative solutions for new cryptographic techniques that enable computing on encrypted data without knowledge of the plaintext, so that both new relevant use cases can be opened up and already known use cases, which are already theoretically but not yet practically feasible, can also become relevant for practice [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","class_list":["post-3188","tender","type-tender","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Encrypted Computing 2 - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/encrypted-computing-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encrypted Computing 2 - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Description The research, development and validation of innovative solutions for new cryptographic techniques that enable computing on encrypted data without knowledge of the plaintext, so that both new relevant use cases can be opened up and already known use cases, which are already theoretically but not yet practically feasible, can also become relevant for practice [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/tenders\/encrypted-computing-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T09:07:59+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/tenders\\\/encrypted-computing-2\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/tenders\\\/encrypted-computing-2\\\/\",\"name\":\"Encrypted Computing 2 - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"datePublished\":\"2024-08-08T17:12:18+00:00\",\"dateModified\":\"2026-04-28T09:07:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/tenders\\\/encrypted-computing-2\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/tenders\\\/encrypted-computing-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/tenders\\\/encrypted-computing-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encrypted Computing 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Encrypted Computing 2 - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/tenders\/encrypted-computing-2\/","og_locale":"en_GB","og_type":"article","og_title":"Encrypted Computing 2 - Cyberagentur","og_description":"Description The research, development and validation of innovative solutions for new cryptographic techniques that enable computing on encrypted data without knowledge of the plaintext, so that both new relevant use cases can be opened up and already known use cases, which are already theoretically but not yet practically feasible, can also become relevant for practice [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/tenders\/encrypted-computing-2\/","og_site_name":"Cyberagentur","article_modified_time":"2026-04-28T09:07:59+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/tenders\/encrypted-computing-2\/","url":"https:\/\/www.cyberagentur.de\/en\/tenders\/encrypted-computing-2\/","name":"Encrypted Computing 2 - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"datePublished":"2024-08-08T17:12:18+00:00","dateModified":"2026-04-28T09:07:59+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/tenders\/encrypted-computing-2\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/tenders\/encrypted-computing-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/tenders\/encrypted-computing-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Encrypted Computing 2"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tenders\/3188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tenders"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/tender"}],"version-history":[{"count":3,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tenders\/3188\/revisions"}],"predecessor-version":[{"id":6510,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tenders\/3188\/revisions\/6510"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=3188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}