Business

Saddling up cryptosystems for a quantum showdown

A lone ranger riding off into the sunset might say something sage and vague, such as "a man is only as good as his word." But these gritty prophets never said anything about verifying a man's—or anyone else's—word in ...

Computer Sciences

NIST announces first four quantum-resistant cryptographic algorithms

The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) has chosen the first group of encryption tools that are designed to withstand the assault of a future quantum computer, which could potentially ...

Security

Using blockchain contracts to build botnets

Blockchain is a decentralized ledger technology that secures the integrity of transactions through digital signatures and will be familiar to anyone who has investigated digital or "crypto" currencies. The technology has ...

Computer Sciences

Two new attacks break PDF certification

A security issue in the certification signatures of PDF documents has been discovered by researchers at Ruhr-Universität Bochum. This special form of signed PDF files can be used, for instance, to conclude contracts. Unlike ...

Security

Laughter as a unique biometric signature

The popular view of biometric security often invokes fingerprint readers, iris or retinal scans, and voice-activated systems. However, any unique human characteristic whether the shape of one's ears, the whole face, the pattern ...

page 1 from 2