A sound idea: A step towards quantum computing

A team at the University of Tsukuba studied a novel process for creating coherent lattice waves inside silicon crystals using ultrashort laser pulses. Using theoretical calculations combined with experimental results that ...

Recommendation for cryptographic key generation

Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission or while in storage. It relies upon two basic components: an algorithm ...

New NIST document offers guidance in cryptographic key generation

(Phys.org)—Protecting sensitive electronic information in different situations requires different types of cryptographic algorithms, but ultimately they all depend on keys, the cryptographic equivalent of a password. A ...

Thwarting the cleverest attackers

In the last 10 years, cryptography researchers have demonstrated that even the most secure-seeming computer is shockingly vulnerable to attack. The time it takes a computer to store data in memory, fluctuations in its power ...

NIST proposes update to digital signature standard

The National Institute of Standards and Technology (NIST) has announced proposed changes to a standard that specifies how to implement digital signatures, which can be used to ensure the integrity of electronic documents, ...

page 1 from 1