Two-factor authentication just got easier
A new, simpler version of two-factor authentication could broaden its protection to many smart devices that currently cannot support it.
Jul 24, 2025
0
40
Post-quantum cryptography addresses the design and deployment of cryptographic primitives and protocols that remain secure against adversaries equipped with quantum computers. Work in this area spans quantum-resistant public-key schemes, lightweight and end-to-end encryption, homomorphic encryption for secure computation on encrypted data, and zero-knowledge proofs for privacy-preserving authentication. It also encompasses quantum key distribution systems, passwordless and multi-factor authentication mechanisms, crypto agility in software, and security analyses of protocols and infrastructures exposed to quantum-era threats.
Security
A new, simpler version of two-factor authentication could broaden its protection to many smart devices that currently cannot support it.
Jul 24, 2025
0
40
Electronics & Semiconductors
With so many people using devices that can be connected to the internet, reliably securing wireless communications and protecting the data they are exchanging is of growing importance. While computer scientists have devised ...
Hardware
Seoul National University College of Engineering announced that a research team has developed a new hardware security technology based on commercially available 3D NAND flash memory (V-NAND flash memory).
Jun 30, 2025
0
59
Telecom
Li-Fi (Light Fidelity) is a wireless communication technology that utilizes the visible light spectrum (400–800 THz), similar to LED light, offering speeds up to 100 times faster than existing Wi-Fi (up to 224 Gbps). While ...
Jun 25, 2025
0
91
Computer Sciences
In our hyper-connected world, we rely on encrypted communications every day—to shop online, digitally sign documents, make bank transactions, check our steps on fitness trackers.
Jun 4, 2025
0
98
Security
Will quantum computers crack cryptographic codes and cause a global security disaster? You might certainly get that impression from a lot of news coverage, the latest of which reports new estimates that it might be 20 times ...
Jun 3, 2025
0
35
Hi Tech & Innovation
To guarantee high data security, encryption must be unbreakable while the data remains rapidly and easily readable. A novel strategy for optical encryption/decryption of information has now been introduced in the journal ...
May 27, 2025
0
37
Telecom
Reports that prominent American national security officials used a freely available encrypted messaging app, coupled with the rise of authoritarian policies around the world, have led to a surge in interest in encrypted apps ...
May 16, 2025
0
40
Security
Location data is considered particularly sensitive—its misuse can have serious consequences. Researchers at the Technical University of Munich (TUM) have developed a method that allows individuals to cryptographically prove ...
May 15, 2025
0
77
Business
High-performance computing, or HPC for short, might sound like something only scientists use in secret labs, but it's actually one of the most important technologies in the world today. From predicting the weather to finding ...
May 14, 2025
0
28