Computer Sciences

NIST announces first four quantum-resistant cryptographic algorithms

The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) has chosen the first group of encryption tools that are designed to withstand the assault of a future quantum computer, which could potentially ...

Security

Using blockchain contracts to build botnets

Blockchain is a decentralized ledger technology that secures the integrity of transactions through digital signatures and will be familiar to anyone who has investigated digital or "crypto" currencies. The technology has ...

Computer Sciences

Two new attacks break PDF certification

A security issue in the certification signatures of PDF documents has been discovered by researchers at Ruhr-Universität Bochum. This special form of signed PDF files can be used, for instance, to conclude contracts. Unlike ...

Security

Laughter as a unique biometric signature

The popular view of biometric security often invokes fingerprint readers, iris or retinal scans, and voice-activated systems. However, any unique human characteristic whether the shape of one's ears, the whole face, the pattern ...

Security

Synthetic signatures and automatic autographs

One's signature, or autograph if one is famous, is a unique identifier for many people. It is used to sign documents from business contracts, cheques, a marriage license and everything in between. However, for those whose ...

Security

New record set for cracking encryption keys

An international team of computer scientists had set a new record for two of the most important computational problems that are the basis for nearly all of the public-key cryptography that is currently used in the real world.

page 1 from 2