Showing 20 articles starting at article 201
< Previous 20 articles Next 20 articles >
Categories: Anthropology: Early Humans, Computer Science: Encryption
Published Tiny, cheap solution for quantum-secure encryption


Engineers propose a new kind of encryption to protect data in the age of quantum computers.
Published Qubits: Developing long-distance quantum telecommunications networks


Computers, smartphones, GPS: quantum physics has enabled many technological advances. It is now opening up new fields of research in cryptography (the art of coding messages) with the aim of developing ultra-secure telecommunications networks. There is one obstacle, however: after a few hundred kilometers within an optical fiber, the photons that carry the qubits or 'quantum bits' (the information) disappear. They therefore need 'repeaters', a kind of 'relay', which are partly based on a quantum memory. By managing to store a qubit in a crystal (a 'memory') for 20 milliseconds, a team has now taken a major step towards the development of long-distance quantum telecommunications networks.
Published Tiny magnets could hold the secret to new quantum computers


Scientists have discovered a type of magnetic behavior that could help enable magnetically based quantum devices.
Published Double locked: Polymer hydrogels secure confidential information


The development of highly secure but simple and inexpensive encryption technology for the prevention of data leaks and forgeries is decidedly challenging. A research team has now introduced a 'double lock' based on thermoresponsive polymer hydrogels that encrypts information so that it can only be read at a specific window in temperature and time.
Published A security technique to fool would-be cyber attackers


Researchers developed a technique that effectively protects computer programs' secret information from memory-timing side channel attacks, while enabling faster computation than other security schemes.
Published The power of chaos: A robust and low-cost cryptosystem for the post-quantum era


Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum computers.
Published How big does your quantum computer need to be?


Researchers decided to explore two very different quantum problems: breaking the encryption of Bitcoin and simulating the molecule responsible for biological nitrogen fixation. They describe a tool they created to determine how big a quantum computer needs to be to solve problems like these and how long it will take.
Published IT security: Computer attacks with laser light


Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts. They show that data can be transmitted to light-emitting diodes of regular office devices using a directed laser. With this, attackers can secretly communicate with air-gapped computer systems over distances of several meters. In addition to conventional information and communication technology security, critical IT systems need to be protected optically as well.
Published Real-world study shows the potential of gait authentication to enhance smartphone security


A study showed that -- within an appropriate framework -- gait recognition could be a viable technique for protecting individuals and their data from potential crime.
Published New chip hides wireless messages in plain sight


Researchers have developed a method for incorporating security in the physical nature of the wireless transmission signal for 5G and future networks.
Published A nanoantenna for long-distance, ultra-secure communication


Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approach will enhance the utility of quantum repeater technology currently under development for advanced communication and data storage. Such technology is essential to overcoming the limitations of classical computer information for securely sharing information over long distances.
Published Big data privacy for machine learning just got 100 times cheaper


Computer scientists have discovered an inexpensive way for tech companies to implement a rigorous form of personal data privacy when using or sharing large databases for machine learning.
Published Securing data transfers with relativity


To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge proofs', the security of which is based on the physical principle of relativity: information cannot travel faster than the speed of light. Thus, one of the fundamental principles of modern physics allows for secure data transfer.
Published Physicists describe photons’ characteristics to protect future quantum computing


Physicists have described in theoretical terms how to develop codes that cannot be broken by quantum computers -- computing devices of the future. These codes rely on distributing single photons that share a quantum character solely among the parties that wish to communicate.
Published Using quantum Parrondo’s random walks for encryption


SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol for semiclassical encryption.
Published Quantum networks in our future


Investigators outline how a time-sensitive network control plane could be a key component of a workable quantum network. In addition to the well-understood requirements of transmission distance and data rate, for quantum networks to be useful in a real-world setting there are at least two other requirements that need to be considered. One is real-time network control, specifically time-sensitive networking. The second is cost.
Published One material with two functions could lead to faster memory


Researchers have developed a new light-emitting memory device by integrating a resistive random-access memory with a light-emitting electrochemical cell that are both based on perovskite. The results are promising for faster data storage and reading in future electronic devices and open a new avenue of applications for perovskite optoelectronics.
Published Is your mobile provider tracking your location? New technology could stop it


Right now, there is a good chance your phone is tracking your location -- even with GPS services turned off. That's because, to receive service, our phones reveal personal identifiers to cell towers owned by major network operators. This has led to vast and largely unregulated data-harvesting industries based around selling users' location data to third parties without consent. For the first time, researchers have found a way to stop this privacy breach using existing cellular networks. The new system protects users' mobile privacy while providing normal mobile connectivity.
Published Impenetrable optical OTP security platform


An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible has been proposed. The device accomplishes this by controlling a variety of information of light including the color, phase, and polarization in one optical device.
Published Compact quantum computer for server centers


Quantum computers have been one-of-a-kind devices that fill entire laboratories. Now, physicists have built a prototype of an ion trap quantum computer that can be used in industry. It fits into two 19-inch server racks like those found in data centers throughout the world. The compact, self-sustained device demonstrates how this technology will soon be more accessible.