#cryptography

[ follow ]
#security
fromHackernoon
1 month ago
Cryptocurrency

Cracking the Code on Blockchain Security: A Plain-English Primer | HackerNoon

Blockchain's security relies on its tamper-evident and irreversible structure, enhanced by cryptographic hashing and chaining of blocks.
fromOracle
1 week ago
Java

Jipher: Java Cryptographic Service Provider for FIPS Environments

Oracle Jipher enables Java applications to meet FIPS 140-2 requirements with a validated cryptographic module.
fromHackernoon
1 month ago
Cryptocurrency

Cracking the Code on Blockchain Security: A Plain-English Primer | HackerNoon

Blockchain's security relies on its tamper-evident and irreversible structure, enhanced by cryptographic hashing and chaining of blocks.
fromOracle
1 week ago
Java

Jipher: Java Cryptographic Service Provider for FIPS Environments

Oracle Jipher enables Java applications to meet FIPS 140-2 requirements with a validated cryptographic module.
more#security
fromNextgov.com
2 days ago
Privacy professionals

Signal clone used by Waltz to archive messages suspends services after reported hack

TeleMessage suspended its services after a hacker breached internal materials, including sensitive information related to U.S. Customs and Border Protection.
#cybersecurity
Information security
fromNextgov.com
4 months ago

Agencies look to automation software to usher in next phase of post-quantum security

Federal agencies are preparing for quantum threats by integrating automated cryptography software into legacy systems, initiating migration to post-quantum standards.
fromTheregister
6 months ago
Information security

WeChat devs modded TLS, introducing security weaknesses

WeChat's modified cryptographic protocol creates significant security weaknesses, particularly in metadata protection and encryption consistency for a widely used application.
fromTheregister
6 months ago
Information security

Chinese researchers claim quantum encryption attack

Chinese researchers used D-Wave's quantum systems to create a threat to classical encryption, challenging current cryptographic standards. Might accelerate development of quantum-resistant encryption.
fromTechiediaries
6 days ago
Information security

Generate and Crack Passwords with Python and Ethical Considerations

Python's secrets module offers secure password generation by utilizing cryptographically strong random number generators.
Following best practices in password creation significantly enhances security against unauthorized access.
Information security
fromNextgov.com
4 months ago

Agencies look to automation software to usher in next phase of post-quantum security

Federal agencies are preparing for quantum threats by integrating automated cryptography software into legacy systems, initiating migration to post-quantum standards.
fromTheregister
6 months ago
Information security

WeChat devs modded TLS, introducing security weaknesses

WeChat's modified cryptographic protocol creates significant security weaknesses, particularly in metadata protection and encryption consistency for a widely used application.
fromTheregister
6 months ago
Information security

Chinese researchers claim quantum encryption attack

Chinese researchers used D-Wave's quantum systems to create a threat to classical encryption, challenging current cryptographic standards. Might accelerate development of quantum-resistant encryption.
fromTechiediaries
6 days ago
Information security

Generate and Crack Passwords with Python and Ethical Considerations

Python's secrets module offers secure password generation by utilizing cryptographically strong random number generators.
Following best practices in password creation significantly enhances security against unauthorized access.
more#cybersecurity
Java
fromInfoWorld
1 week ago

Oracle releases FIPS-validated crypto module for Java

Oracle Jipher enhances cryptographic services with FIPS-140 compliance for Java developers using the JCA framework.
#bitcoin
Cryptocurrency
fromBitcoin Magazine
3 weeks ago

Project Eleven To Award 1 BTC To Tackle Bitcoin's Quantum Vulnerability

Project Eleven launched the Q-Day Prize, offering 1 BTC for breaking ECC cryptography using Shor's algorithm on a quantum computer.
fromBitcoin Magazine
2 weeks ago
Python

Secp256k1lab: An INSECURE Python Library That Makes Bitcoin Safer

A new Python library 'secp256k1lab' provides a unified standard for Bitcoin Improvement Proposals, simplifying cryptographic implementation and reducing redundancy.
fromwww.scientificamerican.com
1 week ago
Information security

This Cutting-Edge Encryption Originates in Renaissance Art and Math

Renaissance art's perspective laws influenced Western art and led to modern cryptographic techniques used in Bitcoin.
fromHackernoon
1 year ago
Privacy professionals

Cypherpunks Write Code: David Chaum & Ecash | HackerNoon

David Chaum pioneered online privacy technology and invented digital cash, earning recognition as an honorary cypherpunk and influencing the foundation of Bitcoin.
Cryptocurrency
fromBitcoin Magazine
3 weeks ago

Project Eleven To Award 1 BTC To Tackle Bitcoin's Quantum Vulnerability

Project Eleven launched the Q-Day Prize, offering 1 BTC for breaking ECC cryptography using Shor's algorithm on a quantum computer.
fromBitcoin Magazine
2 weeks ago
Python

Secp256k1lab: An INSECURE Python Library That Makes Bitcoin Safer

A new Python library 'secp256k1lab' provides a unified standard for Bitcoin Improvement Proposals, simplifying cryptographic implementation and reducing redundancy.
fromwww.scientificamerican.com
1 week ago
Information security

This Cutting-Edge Encryption Originates in Renaissance Art and Math

Renaissance art's perspective laws influenced Western art and led to modern cryptographic techniques used in Bitcoin.
fromHackernoon
1 year ago
Privacy professionals

Cypherpunks Write Code: David Chaum & Ecash | HackerNoon

David Chaum pioneered online privacy technology and invented digital cash, earning recognition as an honorary cypherpunk and influencing the foundation of Bitcoin.
more#bitcoin
#privacy
fromHackernoon
1 year ago
Cryptocurrency

The HackerNoon Newsletter: xAI's Grok 3: All the GPUs, None of the Breakthroughs (4/17/2025) | HackerNoon

Elon Musk's Grok 3 is touted as the world's best AI, sparking comparisons with competitors like GPT-4o and Claude 3.7.
fromHackernoon
1 year ago
London startup

Why Lattica's $3.25M Bet on Fully Homomorphic Encryption Could Change AI Privacy Forever | HackerNoon

Lattica's technology enables AI to process data privately using Fully Homomorphic Encryption, addressing major privacy concerns.
fromHackernoon
1 year ago
Cryptocurrency

Enhancing Security and Privacy on the Bitcoin Network with Zero-Knowledge Proofs | HackerNoon

Zero-knowledge proofs enhance privacy and security in cryptocurrencies by allowing transaction verification without disclosing sensitive information.
fromTechCrunch
8 months ago
Startup companies

How Fabric plans to make advanced cryptography ubiquitous | TechCrunch

Fabric Cryptography aims to make advanced cryptographic methods more accessible, enhancing privacy and trust in the digital age.
fromHackernoon
1 year ago
Cryptocurrency

The HackerNoon Newsletter: xAI's Grok 3: All the GPUs, None of the Breakthroughs (4/17/2025) | HackerNoon

Elon Musk's Grok 3 is touted as the world's best AI, sparking comparisons with competitors like GPT-4o and Claude 3.7.
fromHackernoon
1 year ago
London startup

Why Lattica's $3.25M Bet on Fully Homomorphic Encryption Could Change AI Privacy Forever | HackerNoon

Lattica's technology enables AI to process data privately using Fully Homomorphic Encryption, addressing major privacy concerns.
fromHackernoon
1 year ago
Cryptocurrency

Enhancing Security and Privacy on the Bitcoin Network with Zero-Knowledge Proofs | HackerNoon

Zero-knowledge proofs enhance privacy and security in cryptocurrencies by allowing transaction verification without disclosing sensitive information.
fromTechCrunch
8 months ago
Startup companies

How Fabric plans to make advanced cryptography ubiquitous | TechCrunch

Fabric Cryptography aims to make advanced cryptographic methods more accessible, enhancing privacy and trust in the digital age.
more#privacy
OMG science
fromwww.scientificamerican.com
3 weeks ago

Alan Turing's Lost Work Could Reveal How Tigers Got Their Stripes

Alan Turing's contributions to mathematics and biology reveal the interconnectedness of his work in cryptography, computing, and pattern formation.
Women in technology
fromwww.nytimes.com
1 month ago

Betty Webb, Who Helped Bletchley Park Code Breakers, Dies at 101

Charlotte Webb, a pivotal Bletchley Park codebreaker, passed away at 101, leaving behind a legacy of significant contributions to WWII cryptography.
#blockchain
fromHackernoon
1 month ago
Deliverability

No Waiting, No Mempool: How Solana Moves Crypto at Lightning Speed | HackerNoon

Solana transactions efficiently enable blockchain updates through a structured lifecycle and low-cost processing.
fromHackernoon
1 year ago
Privacy professionals

Holonym Foundation Raises $5.5 Million To Provide Global Digital Personhood With Human Keys | HackerNoon

Holonym Foundation has secured $5.5 million for developing digital identity solutions that enhance user control and privacy on the decentralized web.
fromHackernoon
2 years ago
JavaScript

How Binius Reduces Computational Complexity with Towers of Binary Fields | HackerNoon

Reducing bit width in blockchain computation enhances efficiency, as seen with the Binius project based on Binary Fields.
fromHackernoon
1 year ago
Miscellaneous

The Building Blocks of Secure Cross-Chain Options" | HackerNoon

Blockchain technology enhances transaction security and efficiency through decentralized record keeping and smart contracts.
Deliverability
fromHackernoon
1 month ago

No Waiting, No Mempool: How Solana Moves Crypto at Lightning Speed | HackerNoon

Solana transactions efficiently enable blockchain updates through a structured lifecycle and low-cost processing.
Privacy professionals
fromHackernoon
1 year ago

Holonym Foundation Raises $5.5 Million To Provide Global Digital Personhood With Human Keys | HackerNoon

Holonym Foundation has secured $5.5 million for developing digital identity solutions that enhance user control and privacy on the decentralized web.
fromHackernoon
2 years ago
JavaScript

How Binius Reduces Computational Complexity with Towers of Binary Fields | HackerNoon

Reducing bit width in blockchain computation enhances efficiency, as seen with the Binius project based on Binary Fields.
fromHackernoon
1 year ago
Miscellaneous

The Building Blocks of Secure Cross-Chain Options" | HackerNoon

Blockchain technology enhances transaction security and efficiency through decentralized record keeping and smart contracts.
more#blockchain
Artificial intelligence
fromWIRED
2 months ago

AI Thinks It Cracked Kryptos. The Artist Behind It Says No Chance

Amateur and professional cryptographers continue to struggle with the Kryptos code, particularly the unsolved K4 segment, fueling increased public interest.
Information security
fromThe Hacker News
2 months ago

Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats

Google Cloud introduces quantum-safe digital signatures to protect encryption systems against future quantum computing threats.
fromHackernoon
1 year ago
Miscellaneous

Build (And Then Crack) Your First Message Encryption Protocol With This Guide | HackerNoon

XOR encryption is simple, reversible, and supports multiple keys, making it a foundation of modern cryptographic protocols.
#quantum-computing
fromHackernoon
3 months ago
Information security

Post-Quantum Cryptography: Securing the Future of Encryption | HackerNoon

Quantum computing threatens current cryptography systems.
Post-quantum cryptography is essential for protecting data.
Developing quantum-resistant algorithms is a priority.
fromInfoWorld
5 months ago
Information security

Java app security would get a boost through quantum resistance

Java application security will improve with JDK proposals using quantum-resistant algorithms.
Two proposals outline digital signatures and key encapsulation mechanisms against quantum computing threats.
fromComputerWeekly.com
7 months ago
Privacy professionals

HSBC tests post-quantum VPN tunnel for digital ledgers | Computer Weekly

HSBC launches quantum-secure gold tokens to protect against quantum computing threats, enhancing financial security and interoperability for customers.
fromInfoWorld
5 months ago
Java

Java proposals would boost resistance to quantum computing attacks

Quantum computing advancements pose a serious threat to current information security, necessitating the urgent shift to quantum-resistant algorithms.
fromMedium
10 months ago
Information security

Securemetric and Post-Quantum Readiness with EJBCA

Quantum computing poses a threat to current cryptographic techniques, pushing the need for post-quantum security solutions like EJBCA.
fromHackernoon
3 months ago
Information security

Post-Quantum Cryptography: Securing the Future of Encryption | HackerNoon

Quantum computing threatens current cryptography systems.
Post-quantum cryptography is essential for protecting data.
Developing quantum-resistant algorithms is a priority.
fromInfoWorld
5 months ago
Information security

Java app security would get a boost through quantum resistance

Java application security will improve with JDK proposals using quantum-resistant algorithms.
Two proposals outline digital signatures and key encapsulation mechanisms against quantum computing threats.
fromComputerWeekly.com
7 months ago
Privacy professionals

HSBC tests post-quantum VPN tunnel for digital ledgers | Computer Weekly

HSBC launches quantum-secure gold tokens to protect against quantum computing threats, enhancing financial security and interoperability for customers.
fromInfoWorld
5 months ago
Java

Java proposals would boost resistance to quantum computing attacks

Quantum computing advancements pose a serious threat to current information security, necessitating the urgent shift to quantum-resistant algorithms.
fromMedium
10 months ago
Information security

Securemetric and Post-Quantum Readiness with EJBCA

Quantum computing poses a threat to current cryptographic techniques, pushing the need for post-quantum security solutions like EJBCA.
more#quantum-computing
fromHackernoon
1 year ago
JavaScript

Modern Hashing With Go: A Guide | HackerNoon

Go provides two main types of hash functions: non-cryptographic for speed and cryptographic for security.
fromAgileabstractions
4 months ago
Information security

New Course: Secure Python Web Application Development

The course provides hands-on training in Full Stack Security with a focus on secure Python web application development and practical security tools.
fromMail Online
5 months ago
Writing

The 6 secret codes that remain unsolved - can you crack them?

Some historic codes have defied resolution despite advancements in cryptography.
Cracking historical puzzles could potentially solve crimes or uncover treasures.
fromInfoQ
6 months ago
Java

OpenJDK News Roundup: Compact Object Headers, Synch Virtual Threads, Disable Security Manager

OpenJDK is evolving with significant changes targeting JDK 24, including the removal of outdated features to enhance performance and security.
fromCoindesk
6 months ago
Miscellaneous

Buenos Aires Adds ZK Proofs to City App in Bid to Boost Residents' Privacy

Buenos Aires integrates zero-knowledge proofs into its app to enhance privacy for residents, allowing them to validate information without disclosing personal data.
Cooking
fromWIRED
6 months ago

You Can Now See the Code That Helped End Apartheid

John Graham-Cumming decrypted a file that played a crucial role in South Africa's anti-apartheid history, highlighting tech's intersection with activism.
fromHackernoon
1 year ago
Cryptocurrency

EOS Network significantly Upgrades With 1-Second Transaction Finality | HackerNoon

EOS Network successfully upgraded to Spring 1.0, introducing the Savanna consensus algorithm, resulting in unprecedented 1-second transaction finality.
Artificial intelligence
fromTechRepublic
7 months ago

Gartner: The Top 10 Strategic Technology Trends For 2025

Rapid advancements in AI and computing are crucial for future IT strategies.
C-level executives should focus on technologies likely to disrupt industries by 2025.
Agentic AI will evolve to make autonomous decisions for users.
fromEngadget
8 months ago
Information security

YubiKey vulnerability will let attackers clone the authentication device

NinjaLab has revealed a vulnerability in YubiKey 5 Series that enables cloning of the devices, posing risks mainly to sensitive users.
fromHackernoon
1 year ago
Business

Educational Byte: Cryptography and Its Connection to Cryptocurrencies | HackerNoon

Cryptography evolved from secret writing to securing digital information, essential for personal privacy and online security today.
[ Load more ]