Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

Blockchains in real time

Blockchains promise widescale open Internet applications that are organised decentrally, but this comes at the price of slow performance for every transaction processed by the system. Cryptography researchers working with ...

Xerox launches printed memory products to combat counterfeiting

To help businesses and government better secure products as they are distributed, Xerox today introduced two printed electronic labels (also known as "printed memory") that can collect and store information about the authenticity ...

New algorithm shakes up cryptography

Researchers at the Laboratoire Lorrain de Recherches en Informatique et ses Applications (CNRS/Université de Lorraine/Inria) and the Laboratoire d'Informatique de Paris 6 (CNRS/UPMC) have solved one aspect of the discrete ...

page 1 from 2