Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

Secure computers aren't so secure

(PhysOrg.com) -- Even well-defended computers can leak shocking amounts of private data. MIT researchers seek out exotic attacks in order to shut them down.

PlayStation 3 hack is decryption jolt for Sony

(Phys.org)—This week brings more bad security news for Sony. The unlocking of a console, called jailbreaking, is a way that the jailbreakers get to fulfill their wishes to customize their console to run their own code and ...

Blockchains in real time

Blockchains promise widescale open Internet applications that are organised decentrally, but this comes at the price of slow performance for every transaction processed by the system. Cryptography researchers working with ...

page 1 from 2