New record set for cryptographic challenge

An international team of computer scientists has set a new record for integer factorization, one of the most important computational problems underlying the security of nearly all public-key cryptography currently used today.

Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

High-tech Estonia votes online for European Parliament

Estonia was crippled by cyberattacks on government networks during a dispute with Russia in 2007. Today the tiny tech-savvy nation is so certain of its cyber defenses that it is the only country in the world to allow internet ...

Recommendation for cryptographic key generation

Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission or while in storage. It relies upon two basic components: an algorithm ...

Why do people still use fax machines?

The fax machine is a symbol of obsolete technology long superseded by computer networks – but faxing is actually growing in popularity.

Digitally enhanced: Estonia plots the end of bureaucracy

In the Estonian capital of Tallinn, three-day-old Oskar Lunde sleeps soundly in his hospital cot, snuggled into a lime green blanket decorated with red butterflies. Across the room, his father turns on a laptop.

Reported Yahoo email scanning revives surveillance concerns

Yahoo's reported willingness to search user email to assist U.S. government investigators has revived concerns about court-approved surveillance programs that companies aren't allowed to disclose to the people using their ...

$1M Turing Award winners advocate for encryption

This year's $1 million A.M. Turing Award goes to a pair of cryptographers whose ideas helped make the Internet possible. Both men say giving governments control over encrypted communications puts everyone at risk.

page 1 from 3