Showing 20 articles starting at article 81
< Previous 20 articles Next 20 articles >
Categories: Computer Science: Encryption, Mathematics: Puzzles
Published Tiny magnets could hold the secret to new quantum computers


Scientists have discovered a type of magnetic behavior that could help enable magnetically based quantum devices.
Published Computer games in the classroom: Educational success depends on the teacher


Future teachers see educational potential in computer games, study shows. Teacher training should therefore address their potential in the classroom.
Published Double locked: Polymer hydrogels secure confidential information


The development of highly secure but simple and inexpensive encryption technology for the prevention of data leaks and forgeries is decidedly challenging. A research team has now introduced a 'double lock' based on thermoresponsive polymer hydrogels that encrypts information so that it can only be read at a specific window in temperature and time.
Published A security technique to fool would-be cyber attackers


Researchers developed a technique that effectively protects computer programs' secret information from memory-timing side channel attacks, while enabling faster computation than other security schemes.
Published California's push for computer science education examined


Despite California's computer science education policies, gender, racial and ethnic disparities persist among the high schools that offer these courses, the students enrolled in them and the faculty who teach them.
Published Spatial training with blocks and puzzles could unlock the UK's mathematical potential


A sustained focus on spatial reasoning training could help children learn science, technology, engineering and mathematics.
Published Words are needed to think about numbers, study suggests


Researchers have found a new relationship between counting ability of Tsimane' individuals and their ability to perform matching tasks that involve numbers up to about 25. The results suggest that in order to think about exact numbers, people need to have a word for that number.
Published Researchers use tiny magnetic swirls to generate true random numbers


Skyrmions, tiny magnetic anomalies that arise in two-dimensional materials, can be used to generate true random numbers useful in cryptography and probabilistic computing.
Published The power of chaos: A robust and low-cost cryptosystem for the post-quantum era


Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum computers.
Published How big does your quantum computer need to be?


Researchers decided to explore two very different quantum problems: breaking the encryption of Bitcoin and simulating the molecule responsible for biological nitrogen fixation. They describe a tool they created to determine how big a quantum computer needs to be to solve problems like these and how long it will take.
Published A new approach to a $1 million mathematical enigma


Numbers like pi, e and phi often turn up in unexpected places in science and mathematics. Pascal's triangle and the Fibonacci sequence also seem inexplicably widespread in nature. Then there's the Riemann zeta function, a deceptively straightforward function that has perplexed mathematicians since the 19th century. The most famous quandary, the Riemann hypothesis, is perhaps the greatest unsolved question in mathematics, with the Clay Mathematics Institute offering a $1 million prize for a correct proof.
Published IT security: Computer attacks with laser light


Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts. They show that data can be transmitted to light-emitting diodes of regular office devices using a directed laser. With this, attackers can secretly communicate with air-gapped computer systems over distances of several meters. In addition to conventional information and communication technology security, critical IT systems need to be protected optically as well.
Published Real-world study shows the potential of gait authentication to enhance smartphone security


A study showed that -- within an appropriate framework -- gait recognition could be a viable technique for protecting individuals and their data from potential crime.
Published New chip hides wireless messages in plain sight


Researchers have developed a method for incorporating security in the physical nature of the wireless transmission signal for 5G and future networks.
Published A nanoantenna for long-distance, ultra-secure communication


Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approach will enhance the utility of quantum repeater technology currently under development for advanced communication and data storage. Such technology is essential to overcoming the limitations of classical computer information for securely sharing information over long distances.
Published Big data privacy for machine learning just got 100 times cheaper


Computer scientists have discovered an inexpensive way for tech companies to implement a rigorous form of personal data privacy when using or sharing large databases for machine learning.
Published Just a game? Study shows no evidence that violent video games lead to real-life violence


As the latest Call of Duty video game is released in the UK today, and with Battlefield 2042 and a remastered Grand Theft Auto trilogy to follow later this month, new research finds no evidence that violence increases after a new video game is released.
Published Securing data transfers with relativity


To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge proofs', the security of which is based on the physical principle of relativity: information cannot travel faster than the speed of light. Thus, one of the fundamental principles of modern physics allows for secure data transfer.
Published Physicists describe photons’ characteristics to protect future quantum computing


Physicists have described in theoretical terms how to develop codes that cannot be broken by quantum computers -- computing devices of the future. These codes rely on distributing single photons that share a quantum character solely among the parties that wish to communicate.
Published COVID-19 vaccination strategies: When is one dose better than two?


While most of the COVID-19 vaccines are designed as a two-dose regimen, some countries have prioritized vaccinating as many people as possible with a single dose before giving out an additional dose. In a new study, researchers illustrate the conditions under which a "prime first" vaccine campaign is most effective at stopping the spread of the COVID-19 virus. The team found the vaccine waning rate to be a critically important factor in the decision.