New! Sign up for our free email newsletter.

Encryption News

October 21, 2024

Top Headlines

 

A research group has developed an innovative approach to creating anti-counterfeiting labels for high-value goods. Their findings enhance the security of the currently used cholesteric liquid ...
Building on a landmark algorithm, researchers propose a way to make a smaller and more noise-tolerant quantum factoring circuit for ...
Researchers send entangled photons and laser pulses of the same color over a single optical fiber for the first ...
A new generation of specialty optical fibers has been developed by physicists to cope with the challenges of data transfer expected to arise in the future age of quantum ...

Latest Headlines

updated 11:14pm EDT

Earlier Headlines

 

The traveling salesman problem is considered a prime example of a combinatorial optimization problem. Now a team has shown that a certain class of such problems can actually be solved better and much ...

Through steady advances in the development of quantum computers and their ever-improving performance, it will be possible in the future to crack our current encryption processes. To address this ...

Creating a quantum computer powerful enough to tackle problems we cannot solve with current computers remains a big challenge for quantum physicists. A well-functioning quantum simulator -- a ...

Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum physics with mature cryptography and storage techniques to achieve a cost-effective cloud storage ...

SecureLoop is a new search engine that can identify an optimal design for a deep neural network accelerator that preserves data security while improving energy efficiency and boosting performance. ...

A research team has succeeded in developing a cutting-edge display using transfer-printing techniques, propelling the field of multifunctional displays into new realms of ...

Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption. The researchers behind the study believe ...

With an innovative approach, scientists are creating new standards for data security in the cache of electronic ...

The latest weapon in the war on robocalls is an automated system that analyzes the content of unsolicited bulk calls to shed light on both the scope of the problem and the type of scams being ...

The White House has announced plans to roll out voluntary labeling for internet-connected devices like thermostats and baby monitors that meet certain cybersecurity standards. A new survey of U.S. ...

If you find the computer security guidelines you get at work confusing and not very useful, you're not alone. A new study highlights a key problem with how these guidelines are created, and ...

Researchers have demonstrated a new way of linking personal records and protecting privacy. The first application is in identifying cases of rare genetic disorders. There are many other potential ...

Workers feeling a specific form of stress are more likely than others to become the victims of a phishing attack, according to a new ...

Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker's ability to learn secret information ...

Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six ...

Researchers have achieved a breakthrough to enable 'perfectly secure' hidden communications for the first time. The method uses new advances in information theory methods to conceal one ...

In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode ...

In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as ...

A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or ...

With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's ...

Monday, March 18, 2024

Wednesday, March 13, 2024

Thursday, February 15, 2024

Tuesday, November 14, 2023

Monday, October 30, 2023

Thursday, October 12, 2023

Monday, September 4, 2023

Wednesday, August 9, 2023

Monday, August 7, 2023

Tuesday, July 25, 2023

Monday, July 10, 2023

Wednesday, July 5, 2023

Wednesday, June 28, 2023

Tuesday, June 27, 2023

Tuesday, March 7, 2023

Monday, February 13, 2023

Thursday, January 26, 2023

Monday, December 12, 2022

Monday, November 21, 2022

Wednesday, November 9, 2022

Friday, September 2, 2022

Monday, August 29, 2022

Monday, August 15, 2022

Wednesday, July 27, 2022

Wednesday, July 20, 2022

Wednesday, June 8, 2022

Wednesday, May 25, 2022

Tuesday, May 24, 2022

Thursday, May 5, 2022

Thursday, April 28, 2022

Tuesday, April 5, 2022

Thursday, March 31, 2022

Wednesday, March 23, 2022

Tuesday, March 22, 2022

Monday, March 21, 2022

Tuesday, March 1, 2022

Friday, February 25, 2022

Tuesday, February 1, 2022

Tuesday, January 25, 2022

Tuesday, December 21, 2021

Friday, December 10, 2021

Tuesday, November 23, 2021

Tuesday, November 16, 2021

Thursday, November 4, 2021