Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

All of YouTube in a single teaspoon: Storing information in DNA

Researchers at the Technion–Israel Institute of Technology in Haifa and the Interdisciplinary Center (IDC) Herzliya have demonstrated a significant improvement in the efficiency of the process needed to store digital information ...

Building trust in artificial intelligence

From telecommunications to road traffic, from healthcare to the workplace—digital technology is now an intrinsic part of almost every area of life. Yet how can we ensure that developments in this field, especially those ...

German prosecutors raid Porsche in corruption probe

Prosecutors in Stuttgart said they raided German sports carmaker Porsche on Tuesday on suspicion that an auditor working for the authorities received bribes to pass information to the tax advisor of the Volkswagen subsidiary.

page 1 from 12