Search query: encryption

Categories: All Categories


13142 records searched, 107 records found, 20 matches displayed

< Previous 20 articles        Next 20 articles >


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words for articles published in the last 45 days:
developed (95), climate (85), team (83), species (75), cells (74), used (72), human (64), help (61), change (60), water (60), years (60), data (57), energy (55), such (53), carbon (51), discovered (50), time (48), like (47), materials (46), even (44)


Return to the site home page

Mathematics: Puzzles
Published

Quantum magic squares - Quantum Magic Squares: A New Frontier in Mathematics      (via sciencedaily.com) 

The magic of mathematics is particularly reflected in magic squares. Recently, quantum physicists an...

Computer Science: Encryption Engineering: Biometric
Published

Securing data transfers with relativity - Securing Data Transfers with Relativity: A Comprehensive Guide      (via sciencedaily.com) 

To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge...

Computer Science: Encryption
Published

Self-propelled, endlessly programmable artificial cilia - Self-Propelled, Endlessly Programmable Artificial Cilia: A Breakthrough in Robotics      (via sciencedaily.com) 

Researchers have developed a single-material, single-stimuli microstructure that can outmaneuver eve...

Computer Science: Encryption
Published

How big does your quantum computer need to be? - How Big Does Your Quantum Computer Need to Be?      (via sciencedaily.com) 

Researchers decided to explore two very different quantum problems: breaking the encryption of Bitco ...

Computer Science: Encryption Mathematics: Puzzles
Published

Algorithms improve how we protect our data - Algorithms Improve How We Protect Our Data      (via sciencedaily.com) 

Scientists have developed algorithms that more efficiently measure how difficult it would be for an...

Computer Science: Encryption
Published

Researchers improve data readout by using 'quantum entanglement' - Researchers Improve Data Readout by Using 'Quantum Entanglement'      (via sciencedaily.com) 

Researchers say they have been able to greatly improve the readout of data from digital memories - t...

Computer Science: Encryption
Published

Physicists observe competition between magnetic orders - Physicists Observe Competition Between Magnetic Orders      (via sciencedaily.com) 

Two-dimensional materials, consisting of a single layer of atoms, have been booming in research for...

Computer Science: General Computer Science: Quantum Computers Physics: Quantum Computing
Published

Can you trust your quantum simulator? - Can You Trust Your Quantum Simulator?      (via sciencedaily.com) 

Physicists have developed a protocol to verify the accuracy of quantum experiments. ABSTRACT: Can Yo...

Computer Science: Virtual Reality (VR)
Published

Eavesdroppers can hack 6G frequency with DIY metasurface - Eavesdroppers Can Hack 6G Frequency with DIY Metasurface      (via sciencedaily.com) 

Crafty hackers can make a tool to eavesdrop on some 6G wireless signals in as little as five minutes...

Computer Science: Encryption
Published

Heat-free optical switch would enable optical quantum computing chips - Heat-free Optical Switch: The Key to Optical Quantum Computing Chips      (via sciencedaily.com) 

In a potential boost for quantum computing and communication, a European research collaboration repo...

Computer Science: Encryption
Published

Quantum systems learn joint computing - Quantum Systems Learn Joint Computing: A New Era of Computing      (via sciencedaily.com) 

Researchers realize quantum-logic computer operation between two separate quantum modules in differe...

Computer Science: Encryption
Published

Say goodbye to the dots and dashes to enhance optical storage media - Say Goodbye to the Dots and Dashes to Enhance Optical Storage Media      (via sciencedaily.com) 

A new technology is aimed at modernizing the optical digital storage technology. This advancement al...

Computer Science: Encryption
Published

Transforming circles into squares - Transforming Circles into Squares: A Breakthrough in Mathematics      (via sciencedaily.com) 

Researchers have developed a method to change a cellular material's fundamental topology at the micr...

Computer Science: Virtual Reality (VR)
Published

An AI message decoder based on bacterial growth patterns - An AI Message Decoder Based on Bacterial Growth Patterns      (via sciencedaily.com) 

Depending on the initial conditions used, such as nutrient levels and space constraints, bacteria te...

Computer Science: Encryption
Published

Materials advances are key to development of quantum hardware - Materials Advances are Key to Development of Quantum Hardware      (via sciencedaily.com) 

A new article argues that the ability to move forward on developing useful quantum computers require...