Page 3: Research news on Post-quantum cryptography

Post-quantum cryptography addresses the design and deployment of cryptographic primitives and protocols that remain secure against adversaries equipped with quantum computers. Work in this area spans quantum-resistant public-key schemes, lightweight and end-to-end encryption, homomorphic encryption for secure computation on encrypted data, and zero-knowledge proofs for privacy-preserving authentication. It also encompasses quantum key distribution systems, passwordless and multi-factor authentication mechanisms, crypto agility in software, and security analyses of protocols and infrastructures exposed to quantum-era threats.

Computer Sciences

Ultra-fast random numbers: New generator boosts security and speed

In computer security, random numbers are crucial values that must be unpredictable—such as secret keys or initialization vectors (IVs)—forming the foundation of security systems. To achieve this, deterministic random bit ...

Security

Quantum scheme protects videos from prying eyes and tampering

We have developed a new way to secure video transmissions so even quantum computers in the future won't be able to break into private video livestreams or recordings. We are computer scientists who study computer security. ...

page 3 from 6