Cryptography Newswire

Comprehensive Real-Time News Feed for Cryptography.

Results 1 - 20 of 2,164 in Cryptography

  1. The battle for anonymity on the webRead the original story w/Photo

    5 hrs ago | Newsday

    ... surveillance more difficult. The most important being something called a Mix Network which used sophisticated cryptography not to encrypt the content of message but to hide the identity of the user. As Chaum himself admits, "this was quite a ...


  2. Firefox 32 Debuts With Improved SSL SecurityRead the original story w/Photo

    6 hrs ago | CNet News

    Mozilla is out today with its Firefox 32 release, providing users of the open-source Web browser with new security fixes and features.


  3. The Future of Security: Zeroing In On Un-Hackable Data With Quantum Key DistributionRead the original story w/Photo

    10 hrs ago | Wired

    ... on methods to improve the security of software-based key exchange methods using what is known as post-quantum cryptography - methods that will continue to be effective after quantum computers are powerful enough to break existing key exchange ...


  4. "Contactless" HCE Payments Promise Simplicity But Is It Secure?Read the original story w/Photo

    11 hrs ago | Dark Reading

    ... NFC enabled by specialized hardware on the device called a Secure Element ("SE"), a chip which performs cryptography and stores sensitive data in a secure and trusted environment. With the introduction of Google's Android 4.4 ("KitKat") mobile ...


  5. NIST Issues Best Practices on How to Best Use Secure Shell SoftwareRead the original story w/Photo

    8 hrs ago | CIO

    The Secure Shell protocol and software suite is used by millions of system administrators to log into application and service accounts on remote servers using authentication methods that include passwords, tokens, digital certificates and public keys.


  6. Norma Ball, 92, of MarlboroughRead the original story

    9 hrs ago | Community Advocate Newspaper

    Norma Ball, 92, of Marlborough, died Friday, Aug. 29, 2014. She was the daughter of the late James and Mary Walton.


  7. Today on New ScientistRead the original story w/Photo

    12 hrs ago | New Scientist

    ... have been broken into their prime-number building blocks faster than ever before, with implications for online cryptography Soviet-era hyperboloid tower saved from destruction Modern technology appears to have saved a Soviet relic, following a ...


  8. Virginia cyber accelerator Mach37 names next classRead the original story w/Photo

    12 hrs ago | Business Journal

    ... an accompanying public key management infrastructure, ease the pain of developing, deploying and using strong cryptography. Virgil Security enables a new generation of enhanced privacy and security for applications, cloud services and the Internet ...


  9. Great Barrier Reef may be safe from massive mud dumpRead the original story w/Photo

    12 hrs ago | New Scientist

    ... have been broken into their prime-number building blocks faster than ever before, with implications for online cryptography Modern technology appears to have saved a Soviet relic, following a smartphone vote on the fate of Moscow's extraordinary ...


  10. Could technology prevent Ferguson riots? TechFlash 7 thingsRead the original story w/Photo

    12 hrs ago | Business Journal

    CNN looks into whether technology can potentially prevent another incident similar to the one happening now in Ferguson.


  11. Time Travel Simulation Resolves "Grandfather Paradox"Read the original story w/Photo

    15 hrs ago | Scientific American

    ... would have profound implications for fundamental physics as well as for practical applications such as quantum cryptography and computing. Closed timelike curves The source of time travel speculation lies in the fact that our best physical theories ...


  12. Quantum Chance: BookRead the original story w/Photo

    Sunday | EurekAlert!

    ... is more than just an abstract curiosity or paradox: it has entirely down-to-earth applications in cryptography, serving for example to protect financial information. It also has enabled the demonstration of 'quantum teleportation,' whose infinite ...


  13. 'Factorisation factory' smashes number-cracking recordRead the original story w/Photo

    14 hrs ago | New Scientist

    ... to Mersenne numbers, which are always in the form 2 n -1, where n is any number. These aren't important for cryptography but provide a useful test of the idea because their form makes them somewhat easier to factor. The team started attacking 17 of ...


  14. San Diego Chargers Daily Links: September 2, 2014Read the original story w/Photo

    15 hrs ago | Bolts From The Blue

    ... of knowledge of how to win, like there's a secret formula to winning that requires you to do some Dan Brown cryptography work to outscore the opposition. An Outsider's Guide to Loving College Football - Andrew Sharp If you're not already obsessed ...


  15. IEEE: Top Ten Software Security Design FlawsRead the original story w/Photo

    16 hrs ago | Dr. Dobb's

    ... and the design techniques to avoid them. Practical advice ranges from encouraging the correct use of applied cryptography to validating each individual bit of data. "Bugs and flaws are two very different types of security defects," said participant ...


  16. Accessible Information and Informational Power of Quantum 2-designsRead the original story

    23 hrs ago | CiteULike

    ... constitute a class of ensembles and measurements relevant in testing entropic uncertainty relations, quantum cryptography, and quantum tomography. We provide lower bounds on the entropy of 2-design ensembles and measurements, from which upper bounds ...


  17. Endgame: James Frey's literary treasure huntRead the original story w/Photo

    Yesterday | The Independent

    The American author James Frey has launched a search that could net someone $3m.


  18. django-jwt-auth added to PyPIRead the original story

    Yesterday | Richard Jones' Stuff

    Based on the [Django REST Framework JWT Auth] package. ## Installation Install using `pip`... ``` $ pip install django-jwt-auth ``` ## Usage In your `` add the following URL route to enable obtaining a token via a POST included the user's username and password.


  19. United States : Allied Minds funds Crada to develop cutting-edge cryptography technologyRead the original story

    Yesterday | Hispanic Business

    ... to Boston,the work may only last six more months in Los Alamos. The firm recently said it licensed quantum cryptography technology from LANL. It added that the technology can help safeguard consumers and businesses from data-security attacks. The VP ...


  20. Former Bitcoin coder and ALS patient is now being cryonically frozenRead the original story w/Photo

    Monday | Boy Genius

    Renowned cryptographer Hal Finney, known for his work on PGP encryption software and on early Bitcoin development, has passed away on Thursday following a five-year battle with ALS - a terrible disease that's currently enjoying a viral funding campaign thanks to the "Ice Bucket Challenge" meme - but the programmer hoped that one day technology will ... (more)