Search query: encryption

Categories: All Categories


13142 records searched, 107 records found, top 20 matches displayed

Next 20 articles >


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words for articles published in the last 45 days:
developed (95), climate (85), team (83), species (75), cells (74), used (72), human (64), help (61), change (60), water (60), years (60), data (57), energy (55), such (53), carbon (51), discovered (50), time (48), like (47), materials (46), even (44)


Return to the site home page

Computer Science: Encryption Mathematics: Puzzles
Published

Using quantum Parrondo’s random walks for encryption - Using Quantum Parrondo's Random Walks for Encryption      (via sciencedaily.com) 

SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol f...

Computer Science: Encryption
Published

New technique offers faster security for non-volatile memory tech - New Technique Offers Faster Security for Non-Volatile Memory Tech      (via sciencedaily.com) 

Researchers have developed a technique that leverages hardware and software to improve file system s...

Computer Science: Encryption
Published

Tiny, cheap solution for quantum-secure encryption - Tiny, Cheap Solution for Quantum-Secure Encryption      (via sciencedaily.com) 

Engineers propose a new kind of encryption to protect data in the age of quantum computers. ABSTRACT ...

Computer Science: Encryption Physics: Optics
Published

New study unveils stretchable high-resolution user-interactive synesthesia displays for visual--acoustic encryption      (via sciencedaily.com)     Original source 

A research team has succeeded in developing a cutting-edge display using transfer-printing technique...

Computer Science: Encryption
Published

How randomized data can improve our security      (via sciencedaily.com) 

With an innovative approach, scientists are creating new standards for data security in the cache of...

Computer Science: Encryption Mathematics: Puzzles
Published

A biochemical random number - A Biochemical Random Number: The Future of Encryption?      (via sciencedaily.com)     Original source 

Scientists have generated a huge true random number using DNA synthesis. It is the first time that a...

Mathematics: Puzzles
Published

Randomness theory could hold key to internet security - Randomness Theory Could Hold Key to Internet Security      (via sciencedaily.com) 

Researchers identified a problem that holds the key to whether all encryption can be broken -- as we ...

Computer Science: Encryption Physics: Acoustics and Ultrasound
Published

How secure are voice authentication systems really?      (via sciencedaily.com)     Original source 

Computer scientists have discovered a method of attack that can successfully bypass voice authentica...

Computer Science: Encryption Computer Science: General
Published

Why computer security advice is more confusing than it should be      (via sciencedaily.com) 

If you find the computer security guidelines you get at work confusing and not very useful, you're n...

Computer Science: Encryption
Published

A new weapon in the war on robocall scams      (via sciencedaily.com) 

The latest weapon in the war on robocalls is an automated system that analyzes the content of unsoli...

Computer Science: Encryption
Published

Solving rare disease mysteries ... and protecting privacy      (via sciencedaily.com) 

Researchers have demonstrated a new way of linking personal records and protecting privacy. The firs...

Computer Science: Encryption
Published

Stressed for a bit? Then don't click it, cybersecurity experts advise      (via sciencedaily.com)     Original source 

Workers feeling a specific form of stress are more likely than others to become the victims of a phi...

Computer Science: Encryption Mathematics: General Mathematics: Modeling
Published

Evaluating cybersecurity methods      (via sciencedaily.com)     Original source 

Researchers created a generic framework that enables an engineer or scientist to evaluate the effect...

Computer Science: Encryption Computer Science: General
Published

Computer scientists unveil novel attacks on cybersecurity      (via sciencedaily.com)     Original source 

Researchers have found two novel types of attacks that target the conditional branch predictor found...

Computer Science: Encryption
Published

Graphene key for novel hardware security - Graphene Key for Novel Hardware Security      (via sciencedaily.com) 

As more private data is stored and shared digitally, researchers are exploring new ways to protect d...