Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

Wikipedia down in several countries in EU law protest

Wikipedia went down in at least three countries Wednesday in a protest at an upcoming European Parliament vote on a highly disputed law that could make online platforms legally liable for copyrighted material put on the web ...

Team makes artificial atoms that work at room temp

Ultra-secure online communications, completely indecipherable if intercepted, is one step closer with the help of a recently published discovery by University of Oregon physicist Ben Alemán.

Chance, not ideology, drives political polarization

Ever-widening divisions between Democrats and Republicans are believed to reflect deeply rooted ideological differences, but a new study points to a radically different interpretation: it may be mostly a matter of luck.

page 1 from 23