Showing 20 articles starting at article 61
< Previous 20 articles Next 20 articles >
Categories: Computer Science: Encryption
Published Securing data transfers with relativity (via sciencedaily.com)
To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge proofs', the security of which is based on the physical principle of relativity: information cannot travel faster than the speed of light. Thus, one of the fundamental principles of modern physics allows for secure data transfer.
Published Physicists describe photons’ characteristics to protect future quantum computing (via sciencedaily.com)
Physicists have described in theoretical terms how to develop codes that cannot be broken by quantum computers -- computing devices of the future. These codes rely on distributing single photons that share a quantum character solely among the parties that wish to communicate.
Published Using quantum Parrondo’s random walks for encryption (via sciencedaily.com)
SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol for semiclassical encryption.
Published Quantum networks in our future (via sciencedaily.com)
Investigators outline how a time-sensitive network control plane could be a key component of a workable quantum network. In addition to the well-understood requirements of transmission distance and data rate, for quantum networks to be useful in a real-world setting there are at least two other requirements that need to be considered. One is real-time network control, specifically time-sensitive networking. The second is cost.
Published One material with two functions could lead to faster memory (via sciencedaily.com)
Researchers have developed a new light-emitting memory device by integrating a resistive random-access memory with a light-emitting electrochemical cell that are both based on perovskite. The results are promising for faster data storage and reading in future electronic devices and open a new avenue of applications for perovskite optoelectronics.
Published Is your mobile provider tracking your location? New technology could stop it (via sciencedaily.com)
Right now, there is a good chance your phone is tracking your location -- even with GPS services turned off. That's because, to receive service, our phones reveal personal identifiers to cell towers owned by major network operators. This has led to vast and largely unregulated data-harvesting industries based around selling users' location data to third parties without consent. For the first time, researchers have found a way to stop this privacy breach using existing cellular networks. The new system protects users' mobile privacy while providing normal mobile connectivity.
Published Impenetrable optical OTP security platform (via sciencedaily.com)
An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible has been proposed. The device accomplishes this by controlling a variety of information of light including the color, phase, and polarization in one optical device.
Published Compact quantum computer for server centers (via sciencedaily.com)
Quantum computers have been one-of-a-kind devices that fill entire laboratories. Now, physicists have built a prototype of an ion trap quantum computer that can be used in industry. It fits into two 19-inch server racks like those found in data centers throughout the world. The compact, self-sustained device demonstrates how this technology will soon be more accessible.
Published New twist on DNA data storage lets users preview stored files (via sciencedaily.com)
Researchers have turned a longstanding challenge in DNA data storage into a tool, using it to offer users previews of stored data files -- such as thumbnail versions of image files.
Published 'PrivacyMic': For a smart speaker that doesn't eavesdrop (via sciencedaily.com)
Microphones are perhaps the most common electronic sensor in the world, with an estimated 320 million listening for our commands in the world's smart speakers. The trouble is that they're capable of hearing everything else, too.
Published Graphene key for novel hardware security (via sciencedaily.com)
As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, but artificial intelligence (AI) techniques can be used to predict these keys and gain access to data. Now, researchers have designed a way to make the encrypted keys harder to crack.
Published An uncrackable combination of invisible ink and artificial intelligence (via sciencedaily.com)
Coded messages in invisible ink sound like something only found in espionage books, but in real life, they can have important security purposes. Yet, they can be cracked if their encryption is predictable. Now, researchers have printed complexly encoded data with normal ink and a carbon nanoparticle-based invisible ink, requiring both UV light and a computer that has been taught the code to reveal the correct messages.
Published Algorithms improve how we protect our data (via sciencedaily.com)
Scientists have developed algorithms that more efficiently measure how difficult it would be for an attacker to guess secret keys for cryptographic systems. The approach could reduce the computational complexity needed to validate encryption security.
Published Computer scientists discover new vulnerability affecting computers globally (via sciencedaily.com)
A team o computer science researchers has uncovered a line of attack that breaks all Spectre defenses, meaning that billions of computers and other devices across the globe are just as vulnerable today as they were when Spectre was first announced.
Published Materials advances are key to development of quantum hardware (via sciencedaily.com)
A new article argues that the ability to move forward on developing useful quantum computers requires new major advances in materials science, engineering and fabrication. The authors call for new approaches from broad areas of science and engineering.
Published Transforming circles into squares (via sciencedaily.com)
Researchers have developed a method to change a cellular material's fundamental topology at the microscale.
Published Facial recognition ID with a twist: Smiles, winks and other facial movements for access (via sciencedaily.com)
Concurrent Two-Factor Identity Verification requires both one's facial identity and a specific facial motion to gain access. To set it up, a user faces a camera and records a short 1-2 second video of either a unique facial motion or a lip movement from reading a secret phrase. The video is then input into the device, which extracts facial features and the features of the facial motion, storing them for later ID verification.
Published Researchers discover that privacy-preserving tools leave private data anything but (via sciencedaily.com)
Researchers explored whether private data could still be recovered from images that had been 'sanitized'' by such deep-learning discriminators as privacy protecting GANs (PP-GANs).
Published Heat-free optical switch would enable optical quantum computing chips (via sciencedaily.com)
In a potential boost for quantum computing and communication, a European research collaboration reported a new method of controlling and manipulating single photons without generating heat. The solution makes it possible to integrate optical switches and single-photon detectors in a single chip.
Published Laser system generates random numbers at ultrafast speeds (via sciencedaily.com)
Scientists have developed a system that can generate random numbers over a hundred times faster than current technologies, paving the way towards faster, cheaper, and more secure data encryption in today's digitally connected world.