Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

Black holes stunt growth of dwarf galaxies

Astronomers at the University of California, Riverside, have discovered that powerful winds driven by supermassive black holes in the centers of dwarf galaxies have a significant impact on the evolution of these galaxies ...

Anesthetizing fish may affect research outcomes

Fish use colorful patterns to signal to each other, including advertising for mates and warding off rivals. Studying these colors, especially in small and squirmy species, sometimes entails anesthetizing and photographing ...

Silicon technology boost with graphene and 2-D materials

Silicon semiconductor technology has done marvels for the advancement of our society, which has benefited tremendously from its versatile use and amazing capabilities. The development of electronics, automation, computers, ...

page 2 from 23