Business

Saddling up cryptosystems for a quantum showdown

A lone ranger riding off into the sunset might say something sage and vague, such as "a man is only as good as his word." But these gritty prophets never said anything about verifying a man's—or anyone else's—word in ...

Computer Sciences

Cloud data storage security approach taps quantum physics

Distributed cloud storage is a hot topic for security researchers around the globe pursuing secure data storage, and a team in China is now merging quantum physics with mature cryptography and storage techniques to achieve ...

Hardware

AMD fTPM vulnerability uncovered

Researchers at the Technical University of Berlin say they uncovered a new vulnerability in AMD's Trusted Platform Module (TPM). The flaw exposes firmware TPMs, or fTPMs, to attack.

Computer Sciences

NIST announces first four quantum-resistant cryptographic algorithms

The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) has chosen the first group of encryption tools that are designed to withstand the assault of a future quantum computer, which could potentially ...

Computer Sciences

New technique offers faster security for non-volatile memory tech

Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits ...

page 1 from 3