#cryptography

[ follow ]
#bitcoin
fromBitcoin Magazine
2 days ago
Cryptocurrency

Satoshi's 2010 Quantum Response Is Getting A 2026 Stress Test As Google Warns Timeline May Be Closer Than Expected

Cryptocurrency
fromBitcoin Magazine
2 days ago

Google's New Quantum Research Renews Push To Secure Bitcoin

Bitcoin's reliance on elliptic curve cryptography faces potential threats from quantum computing advancements, necessitating urgent preparation among developers and investors.
Cryptocurrency
fromBitcoin Magazine
8 months ago

New Bitcoin Improvement Proposal Aims To Solve Future Quantum Security Risks

A Bitcoin Improvement Proposal introduces a phased plan to migrate Bitcoin to post-quantum cryptography, addressing safety concerns and consequences for non-compliance.
Cryptocurrency
fromBitcoin Magazine
2 days ago

Satoshi's 2010 Quantum Response Is Getting A 2026 Stress Test As Google Warns Timeline May Be Closer Than Expected

Bitcoin's security can adapt to cryptographic threats, with potential upgrades to stronger algorithms if vulnerabilities arise.
Cryptocurrency
fromBitcoin Magazine
2 days ago

Google's New Quantum Research Renews Push To Secure Bitcoin

Bitcoin's reliance on elliptic curve cryptography faces potential threats from quantum computing advancements, necessitating urgent preparation among developers and investors.
Information security
fromnews.bitcoin.com
1 day ago

Naoris Protocol Deploys Post-Quantum Mainnet to Secure Global Digital Infrastructure

Naoris Protocol launched its Layer 1 mainnet for decentralized post-quantum security, processing over 106 million transactions to combat quantum computing threats.
#quantum-computing
Tech industry
fromFuturism
5 days ago

Google Warns That Quantum Armageddon Is Drawing Closer

Google has moved up its timeline to prepare for quantum computers potentially breaking encryption algorithms to 2029, highlighting significant security threats.
Tech industry
fromArs Technica
1 week ago

Google bumps up Q Day estimate to 2029, far sooner than previously thought

Google aims for 2029 to prepare for Q Day, when quantum computers can break current public-key cryptography.
Information security
fromTechRepublic
1 day ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Science
fromArs Technica
2 days ago

New quantum-computing advances heighten threat to elliptic curve cryptosystems

Utility-scale quantum computers can break elliptic curve cryptography much more efficiently than previously thought.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

Google's Quantum Advances Bring Bitcoin Security Debate Into Focus

Breaking elliptic curve cryptography may require fewer quantum resources than previously thought, raising urgency in the crypto industry.
Information security
fromSecurityWeek
2 days ago

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google's Quantum AI warns that cryptocurrencies are more vulnerable to quantum attacks than previously believed, shortening the timeline for potential threats.
Tech industry
fromFuturism
5 days ago

Google Warns That Quantum Armageddon Is Drawing Closer

Google has moved up its timeline to prepare for quantum computers potentially breaking encryption algorithms to 2029, highlighting significant security threats.
Tech industry
fromArs Technica
1 week ago

Google bumps up Q Day estimate to 2029, far sooner than previously thought

Google aims for 2029 to prepare for Q Day, when quantum computers can break current public-key cryptography.
Information security
fromTheregister
1 week ago

Cryptographer fights RustSec ban over bug reports

Nadim Kobeissi filed a complaint against Rust maintainers over critical bugs in cryptography libraries after facing dismissal and bans.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitcoin's Quantum Risk May Be Real, But The Network Is Preparing: Report

Quantum computing poses a long-term threat to Bitcoin's security through elliptic curve cryptography, but developers are actively building protective solutions before the technology becomes viable.
Cryptocurrency
fromCointelegraph
3 weeks ago

Bitcoin's Quantum Defense Plan: What BIP-360 Actually Changes

BIP-360 formally adds quantum resistance to Bitcoin's roadmap through Pay-to-Merkle-Root, reducing elliptic curve exposure by eliminating Taproot key path spending while preserving smart contract flexibility.
Science
fromPadailypost
1 month ago

Arthur H. Hausman

Arthur Herbert Hausman (1923–2026) was a cryptologist, engineer, and executive whose innovations in cryptography, electronics, and broadcasting advanced national security and global media.
Information security
fromTheregister
1 month ago

How the GNU C Compiler became the Clippy of cryptography

Modern compilers optimize away security protections, causing constant-time and other defensive code to fail and reintroducing side-channel vulnerabilities.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

AES-256-GCM strong encryption provides robust, reliable protection for sensitive personal data as a last line of defense against modern cyber threats.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, is essential as the last line of defense to protect sensitive personal data against modern cyber threats.
fromwww.bbc.com
4 months ago

Cryptology firm cancels elections after losing encryption key

The International Association for Cryptologic Research (IACR) uses an electronic voting system which needs three members, each with part of an encrypted key, to access the results. In a statement, the scientific organisation said one of the trustees had lost their key in "an honest but unfortunate human mistake", making it impossible for them to decrypt - and uncover - the final results.
Information security
Information security
fromArs Technica
4 months ago

Cryptography group cancels election results after official loses secret key

A lost trustee private key prevented decryption of IACR’s Helios-election ballots, causing results cancellation and prompting a re-run with revised key-sharing rules.
#kryptos
fromWIRED
4 months ago

Inside the Multimillion-Dollar Plan to Make Mobile Voting Happen

Joe Kiniry, a security expert specializing in elections, was attending an annual conference on voting technology in Washington, DC, when a woman approached him with an unusual offer. She said she represented a wealthy client interested in funding voting systems that would encourage bigger turnouts. Did he have any ideas? "I told her you should stay away from internet voting, because it's really, really hard," he says.
US politics
fromInfoWorld
4 months ago

Microsoft's .NET 10 arrives with AI, runtime, and language improvements

For cryptography, .NET 10 introduces extensive new APIs across cryptography, globalization, numerics, serialization, collections, and diagnostics. Also, with quantum computing on the horizon, .NET 10 expands post-quantum cryptography support with Windows Cryptography API: Next Generation (CNG) support, enhanced ML-DSA with simplified APIs, and HashML-DSA support, plus Composite ML-DSA for hybrid approaches. Additional cryptography enhancements include AES KeyWrap with Padding support for secure key wrapping scenarios.
Information security
#privacy
fromenglish.elpais.com
6 months ago

The spies of the pharaohs and the double agents of the Caesars: How intelligence services operated in antiquity

It may sound anachronistic to use terms like espionage, counterintelligence, secret services, or double agents in relation to ancient times. But activities, organizations, and personnel that largely fit our current concepts were widely deployed by the civilizations of the ancient world, giving truth to the saying that there is nothing new under the Sun (or, in this case, the shadows). To provide a few examples: Ramses II was nearly defeated at the Battle of Kadesh (which ended in a stalemate)
History
fromGSMArena.com
7 months ago

UK drops its request for encrypted iCloud data backdoor

Over six months after these events, U.S. Director of National Intelligence Tulsi Gabbard confirmed that the UK has withdrawn its requests following months of talks between the two governments.
Privacy technologies
fromHackernoon
2 years ago

Cryptography's Developer Dilemma: An Urgent Call for API Research | HackerNoon

We clustered 91,954 cryptography-related questions on Stack Overflow and manually analyzed 383 to comprehend the crypto challenges developers face. Developers showed a lack of knowledge of fundamental concepts.
Cryptocurrency
fromTheregister
8 months ago

The EFF turns 35, but there's plenty more to do

The organization has since been prominent in some of the most important legal battles for privacy, online operations, and legislative correction.
Privacy professionals
Cryptocurrency
fromInfoWorld
9 months ago

Bringing post-quantum cryptography to Windows

Post-quantum cryptography addresses vulnerabilities of conventional and quantum computing, focusing on securing valuable information.
#blockchain
fromHackernoon
2 years ago
Cryptocurrency

Zama Raises $57M In Series B To Bring End-to-End Encryption To Public Blockchains | HackerNoon

fromHackernoon
2 years ago
Privacy technologies

Zero-Knowledge, Zero Limits: The Vision Behind Aleo's New Blockchain Paradigm | HackerNoon

fromHackernoon
2 years ago
Cryptocurrency

Zama Raises $57M In Series B To Bring End-to-End Encryption To Public Blockchains | HackerNoon

fromHackernoon
2 years ago
Privacy technologies

Zero-Knowledge, Zero Limits: The Vision Behind Aleo's New Blockchain Paradigm | HackerNoon

Privacy technologies
fromHackernoon
10 months ago

Cutting Private Key Backup Failures by 6 Orders of Magnitude | HackerNoon

The proposed backup methods provide enhanced security and reliability for private key recovery.
Trustees have only permission, while the owner retains possession, improving overall security.
Cryptocurrency
fromTechzine Global
10 months ago

Windows 11 will feature cryptography that can withstand quantum computers

Windows 11 now incorporates support for post-quantum cryptography to secure data against future quantum computing threats.
fromInfoQ
10 months ago

OpenJDK News Roundup: Key Derivation, Scoped Values, Compact Headers, JFR Method Timing & Tracing

JEP 510 proposes the finalization of the Key Derivation Function API after one round of preview, enhancing cryptographic capabilities in Java.
Java
Scala
fromHackernoon
1 year ago

Go 1.22: Bringing Math/rand and Crypto/rand together | HackerNoon

Go 1.22 enhances random number generation by integrating cryptographic sources into the math/rand package, improving randomness and mitigating misuse risks.
fromComputerWeekly.com
10 months ago

Preparing for post quantum computing will be more difficult than the millenium bug | Computer Weekly

The transformation needed for organisations in the UK to be ready for the threat of post-quantum computing will make preparations for the millennium bug look easy, cyber chiefs said today.
Information security
Privacy professionals
fromNextgov.com
10 months ago

Signal clone used by Waltz to archive messages suspends services after reported hack

TeleMessage suspended its services after a hacker breached internal materials, including sensitive information related to U.S. Customs and Border Protection.
Information security
fromTechiediaries
11 months ago

Generate and Crack Passwords with Python and Ethical Considerations

Python's secrets module offers secure password generation by utilizing cryptographically strong random number generators.
Following best practices in password creation significantly enhances security against unauthorized access.
fromInfoWorld
11 months ago

Oracle releases FIPS-validated crypto module for Java

Oracle's Jipher introduces a FIPS-140 validated OpenSSL module for Java developers, enhancing security within the standard Java Cryptography Architecture framework.
Java
Java
fromOracle
11 months ago

Jipher: Java Cryptographic Service Provider for FIPS Environments

Oracle Jipher enables Java applications to meet FIPS 140-2 requirements with a validated cryptographic module.
London startup
fromHackernoon
2 years ago

Why Lattica's $3.25M Bet on Fully Homomorphic Encryption Could Change AI Privacy Forever | HackerNoon

Lattica's technology enables AI to process data privately using Fully Homomorphic Encryption, addressing major privacy concerns.
Cryptocurrency
fromHackernoon
2 years ago

The HackerNoon Newsletter: xAI's Grok 3: All the GPUs, None of the Breakthroughs (4/17/2025) | HackerNoon

Elon Musk's Grok 3 is touted as the world's best AI, sparking comparisons with competitors like GPT-4o and Claude 3.7.
NYC startup
fromSilicon Canals
11 months ago

Amsterdam's Invest-NL takes priority stake in Fox Crypto following NCC Group divestment: Know more - Silicon Canals

Invest-NL has acquired a stake in Fox Crypto to enhance the Netherlands' cryptographic capabilities at the request of various Dutch ministries.
[ Load more ]