Page 4: Research news on Post-quantum cryptography

Post-quantum cryptography addresses the design and deployment of cryptographic primitives and protocols that remain secure against adversaries equipped with quantum computers. Work in this area spans quantum-resistant public-key schemes, lightweight and end-to-end encryption, homomorphic encryption for secure computation on encrypted data, and zero-knowledge proofs for privacy-preserving authentication. It also encompasses quantum key distribution systems, passwordless and multi-factor authentication mechanisms, crypto agility in software, and security analyses of protocols and infrastructures exposed to quantum-era threats.

Security

Two-factor authentication just got easier

A new, simpler version of two-factor authentication could broaden its protection to many smart devices that currently cannot support it.

Security

Is a quantum-cryptography apocalypse imminent?

Will quantum computers crack cryptographic codes and cause a global security disaster? You might certainly get that impression from a lot of news coverage, the latest of which reports new estimates that it might be 20 times ...

Hi Tech & Innovation

Secure encryption and decryption with luminescent perovskites

To guarantee high data security, encryption must be unbreakable while the data remains rapidly and easily readable. A novel strategy for optical encryption/decryption of information has now been introduced in the journal ...

Business

Challenges to high-performance computing threaten US innovation

High-performance computing, or HPC for short, might sound like something only scientists use in secret labs, but it's actually one of the most important technologies in the world today. From predicting the weather to finding ...

page 4 from 6