Showing 20 articles starting at article 101

< Previous 20 articles        Next 20 articles >

Categories: Computer Science: Encryption, Mathematics: Puzzles

Return to the site home page

Computer Science: Encryption Mathematics: Puzzles
Published

Using quantum Parrondo’s random walks for encryption      (via sciencedaily.com) 

SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol for semiclassical encryption.

Computer Science: Encryption
Published

Quantum networks in our future      (via sciencedaily.com) 

Investigators outline how a time-sensitive network control plane could be a key component of a workable quantum network. In addition to the well-understood requirements of transmission distance and data rate, for quantum networks to be useful in a real-world setting there are at least two other requirements that need to be considered. One is real-time network control, specifically time-sensitive networking. The second is cost.

Computer Science: Encryption
Published

One material with two functions could lead to faster memory      (via sciencedaily.com) 

Researchers have developed a new light-emitting memory device by integrating a resistive random-access memory with a light-emitting electrochemical cell that are both based on perovskite. The results are promising for faster data storage and reading in future electronic devices and open a new avenue of applications for perovskite optoelectronics.

Computer Science: Encryption
Published

Is your mobile provider tracking your location? New technology could stop it      (via sciencedaily.com) 

Right now, there is a good chance your phone is tracking your location -- even with GPS services turned off. That's because, to receive service, our phones reveal personal identifiers to cell towers owned by major network operators. This has led to vast and largely unregulated data-harvesting industries based around selling users' location data to third parties without consent. For the first time, researchers have found a way to stop this privacy breach using existing cellular networks. The new system protects users' mobile privacy while providing normal mobile connectivity.

Computer Science: Encryption
Published

Impenetrable optical OTP security platform      (via sciencedaily.com) 

An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible has been proposed. The device accomplishes this by controlling a variety of information of light including the color, phase, and polarization in one optical device.

Mathematics: Puzzles
Published

Mathematician reveals world’s oldest example of applied geometry      (via sciencedaily.com) 

A scientist has revealed that an ancient clay tablet could be the oldest and most complete example of applied geometry. The surveyor's field plan from the Old Babylon period shows that ancient mathematics was more advanced than previously thought.

Mathematics: Puzzles
Published

Training helps teachers anticipate how students with learning disabilities might solve problems      (via sciencedaily.com) 

Researchers found that a four-week training course made a substantial difference in helping special education teachers anticipate different ways students with learning disabilities might solve math problems.

Mathematics: Puzzles
Published

Thinking in 3D improves mathematical skills      (via sciencedaily.com) 

Spatial reasoning ability in small children reflects how well they will perform in mathematics later. Researchers recently came to this conclusion, making the case for better cultivation of spatial reasoning.

Computer Science: Encryption
Published

Compact quantum computer for server centers      (via sciencedaily.com) 

Quantum computers have been one-of-a-kind devices that fill entire laboratories. Now, physicists have built a prototype of an ion trap quantum computer that can be used in industry. It fits into two 19-inch server racks like those found in data centers throughout the world. The compact, self-sustained device demonstrates how this technology will soon be more accessible.

Computer Science: Encryption
Published

New twist on DNA data storage lets users preview stored files      (via sciencedaily.com) 

Researchers have turned a longstanding challenge in DNA data storage into a tool, using it to offer users previews of stored data files -- such as thumbnail versions of image files.

Computer Science: Encryption
Published

'PrivacyMic': For a smart speaker that doesn't eavesdrop      (via sciencedaily.com) 

Microphones are perhaps the most common electronic sensor in the world, with an estimated 320 million listening for our commands in the world's smart speakers. The trouble is that they're capable of hearing everything else, too.

Mathematics: Puzzles
Published

These cognitive exercises help young children boost their math skills, study shows      (via sciencedaily.com) 

Young children who practice visual working memory and reasoning tasks improve their math skills more than children who focus on spatial rotation exercises, according to a large study. The findings support the notion that training spatial cognition can enhance academic performance and that when it comes to math, the type of training matters.

Computer Science: Encryption
Published

Graphene key for novel hardware security      (via sciencedaily.com) 

As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, but artificial intelligence (AI) techniques can be used to predict these keys and gain access to data. Now, researchers have designed a way to make the encrypted keys harder to crack.

Computer Science: Encryption
Published

An uncrackable combination of invisible ink and artificial intelligence      (via sciencedaily.com) 

Coded messages in invisible ink sound like something only found in espionage books, but in real life, they can have important security purposes. Yet, they can be cracked if their encryption is predictable. Now, researchers have printed complexly encoded data with normal ink and a carbon nanoparticle-based invisible ink, requiring both UV light and a computer that has been taught the code to reveal the correct messages.

Computer Science: Encryption Mathematics: Puzzles
Published

Algorithms improve how we protect our data      (via sciencedaily.com) 

Scientists have developed algorithms that more efficiently measure how difficult it would be for an attacker to guess secret keys for cryptographic systems. The approach could reduce the computational complexity needed to validate encryption security.

Computer Science: Encryption
Published

Computer scientists discover new vulnerability affecting computers globally      (via sciencedaily.com) 

A team o computer science researchers has uncovered a line of attack that breaks all Spectre defenses, meaning that billions of computers and other devices across the globe are just as vulnerable today as they were when Spectre was first announced.

Mathematics: Puzzles
Published

Silicon could be a photonics game-changer      (via sciencedaily.com) 

New research has shown that silicon could be one of the most powerful materials for photonic informational manipulation - opening up new possibilities for the production of lasers and displays.

Computer Science: Encryption
Published

Materials advances are key to development of quantum hardware      (via sciencedaily.com) 

A new article argues that the ability to move forward on developing useful quantum computers requires new major advances in materials science, engineering and fabrication. The authors call for new approaches from broad areas of science and engineering.

Computer Science: Encryption
Published

Transforming circles into squares      (via sciencedaily.com) 

Researchers have developed a method to change a cellular material's fundamental topology at the microscale.

Mathematics: Puzzles
Published

Auxin makes the spirals in gerbera inflorescences follow the Fibonacci sequence      (via sciencedaily.com) 

The meristem of the gerbera is patterned on the molecular level already at a stage where no primordia or other changes are discernible by even an electron microscope.