Page 5: Research news on Post-quantum cryptography

Post-quantum cryptography addresses the design and deployment of cryptographic primitives and protocols that remain secure against adversaries equipped with quantum computers. Work in this area spans quantum-resistant public-key schemes, lightweight and end-to-end encryption, homomorphic encryption for secure computation on encrypted data, and zero-knowledge proofs for privacy-preserving authentication. It also encompasses quantum key distribution systems, passwordless and multi-factor authentication mechanisms, crypto agility in software, and security analyses of protocols and infrastructures exposed to quantum-era threats.

Security

Is a quantum-cryptography apocalypse imminent?

Will quantum computers crack cryptographic codes and cause a global security disaster? You might certainly get that impression from a lot of news coverage, the latest of which reports new estimates that it might be 20 times ...

Hi Tech & Innovation

Secure encryption and decryption with luminescent perovskites

To guarantee high data security, encryption must be unbreakable while the data remains rapidly and easily readable. A novel strategy for optical encryption/decryption of information has now been introduced in the journal ...

Business

Challenges to high-performance computing threaten US innovation

High-performance computing, or HPC for short, might sound like something only scientists use in secret labs, but it's actually one of the most important technologies in the world today. From predicting the weather to finding ...

Computer Sciences

Quantum computers could crack the security codes used by satellites

Satellites are the invisible backbone of modern life. They guide airplanes, help us find our way with GPS, deliver TV and the internet, and even help emergency services respond to disasters. But a new kind of computer—quantum ...

Security

Spy vs. spy: Researchers work to secure messaging

When you send a message through WhatsApp or iMessage, you might think only you and the recipient can read it. Thanks to end-to-end encryption (E2EE), that's usually true, but it's not the whole story, says Dr. Nitesh Saxena, ...

page 5 from 6