Computer Science: Encryption
Published

Tiny magnets could hold the secret to new quantum computers      (via sciencedaily.com) 

Scientists have discovered a type of magnetic behavior that could help enable magnetically based quantum devices.

Mathematics: Puzzles
Published

Computer games in the classroom: Educational success depends on the teacher      (via sciencedaily.com) 

Future teachers see educational potential in computer games, study shows. Teacher training should therefore address their potential in the classroom.

Computer Science: Encryption
Published

Double locked: Polymer hydrogels secure confidential information      (via sciencedaily.com) 

The development of highly secure but simple and inexpensive encryption technology for the prevention of data leaks and forgeries is decidedly challenging. A research team has now introduced a 'double lock' based on thermoresponsive polymer hydrogels that encrypts information so that it can only be read at a specific window in temperature and time.

Computer Science: Encryption
Published

A security technique to fool would-be cyber attackers      (via sciencedaily.com) 

Researchers developed a technique that effectively protects computer programs' secret information from memory-timing side channel attacks, while enabling faster computation than other security schemes.

Mathematics: Puzzles
Published

California's push for computer science education examined      (via sciencedaily.com) 

Despite California's computer science education policies, gender, racial and ethnic disparities persist among the high schools that offer these courses, the students enrolled in them and the faculty who teach them.

Mathematics: Puzzles
Published

Spatial training with blocks and puzzles could unlock the UK's mathematical potential      (via sciencedaily.com) 

A sustained focus on spatial reasoning training could help children learn science, technology, engineering and mathematics.

Mathematics: Puzzles
Published

Words are needed to think about numbers, study suggests      (via sciencedaily.com) 

Researchers have found a new relationship between counting ability of Tsimane' individuals and their ability to perform matching tasks that involve numbers up to about 25. The results suggest that in order to think about exact numbers, people need to have a word for that number.

Mathematics: Puzzles
Published

Researchers use tiny magnetic swirls to generate true random numbers      (via sciencedaily.com) 

Skyrmions, tiny magnetic anomalies that arise in two-dimensional materials, can be used to generate true random numbers useful in cryptography and probabilistic computing.

Computer Science: Encryption Mathematics: Puzzles
Published

The power of chaos: A robust and low-cost cryptosystem for the post-quantum era      (via sciencedaily.com) 

Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum computers.

Computer Science: Encryption
Published

How big does your quantum computer need to be?      (via sciencedaily.com) 

Researchers decided to explore two very different quantum problems: breaking the encryption of Bitcoin and simulating the molecule responsible for biological nitrogen fixation. They describe a tool they created to determine how big a quantum computer needs to be to solve problems like these and how long it will take.

Mathematics: Puzzles
Published

A new approach to a $1 million mathematical enigma      (via sciencedaily.com) 

Numbers like pi, e and phi often turn up in unexpected places in science and mathematics. Pascal's triangle and the Fibonacci sequence also seem inexplicably widespread in nature. Then there's the Riemann zeta function, a deceptively straightforward function that has perplexed mathematicians since the 19th century. The most famous quandary, the Riemann hypothesis, is perhaps the greatest unsolved question in mathematics, with the Clay Mathematics Institute offering a $1 million prize for a correct proof.

Computer Science: Encryption
Published

IT security: Computer attacks with laser light      (via sciencedaily.com) 

Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts. They show that data can be transmitted to light-emitting diodes of regular office devices using a directed laser. With this, attackers can secretly communicate with air-gapped computer systems over distances of several meters. In addition to conventional information and communication technology security, critical IT systems need to be protected optically as well.

Computer Science: Encryption Engineering: Biometric
Published

Real-world study shows the potential of gait authentication to enhance smartphone security      (via sciencedaily.com) 

A study showed that -- within an appropriate framework -- gait recognition could be a viable technique for protecting individuals and their data from potential crime.

Computer Science: Encryption
Published

New chip hides wireless messages in plain sight      (via sciencedaily.com) 

Researchers have developed a method for incorporating security in the physical nature of the wireless transmission signal for 5G and future networks.

Computer Science: Encryption
Published

A nanoantenna for long-distance, ultra-secure communication      (via sciencedaily.com) 

Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approach will enhance the utility of quantum repeater technology currently under development for advanced communication and data storage. Such technology is essential to overcoming the limitations of classical computer information for securely sharing information over long distances.

Computer Science: Encryption
Published

Big data privacy for machine learning just got 100 times cheaper      (via sciencedaily.com) 

Computer scientists have discovered an inexpensive way for tech companies to implement a rigorous form of personal data privacy when using or sharing large databases for machine learning.

Mathematics: Puzzles
Published

Just a game? Study shows no evidence that violent video games lead to real-life violence      (via sciencedaily.com) 

As the latest Call of Duty video game is released in the UK today, and with Battlefield 2042 and a remastered Grand Theft Auto trilogy to follow later this month, new research finds no evidence that violence increases after a new video game is released.

Computer Science: Encryption Engineering: Biometric
Published

Securing data transfers with relativity      (via sciencedaily.com) 

To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge proofs', the security of which is based on the physical principle of relativity: information cannot travel faster than the speed of light. Thus, one of the fundamental principles of modern physics allows for secure data transfer.

Computer Science: Encryption
Published

Physicists describe photons’ characteristics to protect future quantum computing      (via sciencedaily.com) 

Physicists have described in theoretical terms how to develop codes that cannot be broken by quantum computers -- computing devices of the future. These codes rely on distributing single photons that share a quantum character solely among the parties that wish to communicate.

Mathematics: Puzzles
Published

COVID-19 vaccination strategies: When is one dose better than two?      (via sciencedaily.com) 

While most of the COVID-19 vaccines are designed as a two-dose regimen, some countries have prioritized vaccinating as many people as possible with a single dose before giving out an additional dose. In a new study, researchers illustrate the conditions under which a "prime first" vaccine campaign is most effective at stopping the spread of the COVID-19 virus. The team found the vaccine waning rate to be a critically important factor in the decision.