#cryptography

[ follow ]
#blockchain
Digital life
fromHackernoon
2 months ago

Meet Ed25519, The Tiny Crypto Algorithm That Makes Solana Insanely Fast and Secure | HackerNoon

Ed25519 is an efficient asymmetric cryptographic algorithm optimized for digital signatures, ideal for high-performance systems and resistant to various cryptographic attacks.
Deliverability
fromHackernoon
2 months ago

No Waiting, No Mempool: How Solana Moves Crypto at Lightning Speed | HackerNoon

Solana transactions efficiently enable blockchain updates through a structured lifecycle and low-cost processing.
Privacy professionals
fromHackernoon
1 year ago

Holonym Foundation Raises $5.5 Million To Provide Global Digital Personhood With Human Keys | HackerNoon

Holonym Foundation has secured $5.5 million for developing digital identity solutions that enhance user control and privacy on the decentralized web.
fromHackernoon
1 year ago
Cryptocurrency

The HackerNoon Newsletter: xAI's Grok 3: All the GPUs, None of the Breakthroughs (4/17/2025) | HackerNoon

fromHackernoon
1 year ago
Privacy technologies

Zero-Knowledge, Zero Limits: The Vision Behind Aleo's New Blockchain Paradigm | HackerNoon

Digital life
fromHackernoon
2 months ago

Meet Ed25519, The Tiny Crypto Algorithm That Makes Solana Insanely Fast and Secure | HackerNoon

Ed25519 is an efficient asymmetric cryptographic algorithm optimized for digital signatures, ideal for high-performance systems and resistant to various cryptographic attacks.
Deliverability
fromHackernoon
2 months ago

No Waiting, No Mempool: How Solana Moves Crypto at Lightning Speed | HackerNoon

Solana transactions efficiently enable blockchain updates through a structured lifecycle and low-cost processing.
Privacy professionals
fromHackernoon
1 year ago

Holonym Foundation Raises $5.5 Million To Provide Global Digital Personhood With Human Keys | HackerNoon

Holonym Foundation has secured $5.5 million for developing digital identity solutions that enhance user control and privacy on the decentralized web.
fromHackernoon
1 year ago
Cryptocurrency

The HackerNoon Newsletter: xAI's Grok 3: All the GPUs, None of the Breakthroughs (4/17/2025) | HackerNoon

fromHackernoon
1 year ago
Privacy technologies

Zero-Knowledge, Zero Limits: The Vision Behind Aleo's New Blockchain Paradigm | HackerNoon

#security
Cryptocurrency
fromTechzine Global
1 day ago

Windows 11 will feature cryptography that can withstand quantum computers

Windows 11 now incorporates support for post-quantum cryptography to secure data against future quantum computing threats.
Java
fromInfoQ
1 week ago

OpenJDK News Roundup: Key Derivation, Scoped Values, Compact Headers, JFR Method Timing & Tracing

OpenJDK is rapidly evolving with several JEPs poised for finalization in JDK 25, including significant enhancements in cryptography and memory management.
#software-development
#cyber-security
Information security
fromComputerWeekly.com
2 weeks ago

Preparing for post quantum computing will be more difficult than the millenium bug | Computer Weekly

UK organizations must prepare for post-quantum computing, a complex task anticipated to be greater than preparation for the millennium bug.
Information security
fromComputerWeekly.com
2 weeks ago

Preparing for post quantum computing will be more difficult than the millenium bug | Computer Weekly

UK organizations must prepare for post-quantum computing, a complex task anticipated to be greater than preparation for the millennium bug.
fromNextgov.com
3 weeks ago

Signal clone used by Waltz to archive messages suspends services after reported hack

TeleMessage, a cloned version of encrypted messaging app Signal, has suspended service following a security incident where sensitive materials were accessed by a hacker.
Privacy professionals
#cybersecurity
Information security
fromInfoQ
2 months ago

Google Cloud Introduces Quantum-Safe Digital Signatures in Cloud KMS to Future-Proof Data Security

Google introduces quantum-safe digital signatures in its Cloud KMS to combat future quantum computing threats to traditional encryption.
Privacy technologies
fromTechRepublic
3 months ago

Google Announces Quantum-Safe Digital Signatures in Cloud KMS

Google Cloud introduces quantum-safe digital signatures to secure against potential quantum computing threats.
Post-quantum cryptography (PQC) provides a path to protect existing cryptographic systems from future quantum risks.
Privacy professionals
fromArs Technica
1 month ago

FBI raids home of prominent computer scientist who has gone incommunicado

Xiaofeng Wang, a prominent professor, has gone missing amidst FBI raids and communications removal, sparking speculation about serious allegations.
Privacy professionals
fromWIRED
1 month ago

Cybersecurity Professor Mysteriously Disappears as FBI Raids His Homes

A prominent computer scientist, Xiaofeng Wang, has vanished amid an FBI investigation, raising significant concerns in academic circles about privacy and security.
Information security
fromInfoQ
2 months ago

Google Cloud Introduces Quantum-Safe Digital Signatures in Cloud KMS to Future-Proof Data Security

Google introduces quantum-safe digital signatures in its Cloud KMS to combat future quantum computing threats to traditional encryption.
Privacy technologies
fromTechRepublic
3 months ago

Google Announces Quantum-Safe Digital Signatures in Cloud KMS

Google Cloud introduces quantum-safe digital signatures to secure against potential quantum computing threats.
Post-quantum cryptography (PQC) provides a path to protect existing cryptographic systems from future quantum risks.
Privacy professionals
fromArs Technica
1 month ago

FBI raids home of prominent computer scientist who has gone incommunicado

Xiaofeng Wang, a prominent professor, has gone missing amidst FBI raids and communications removal, sparking speculation about serious allegations.
Privacy professionals
fromWIRED
1 month ago

Cybersecurity Professor Mysteriously Disappears as FBI Raids His Homes

A prominent computer scientist, Xiaofeng Wang, has vanished amid an FBI investigation, raising significant concerns in academic circles about privacy and security.
Java
fromInfoWorld
3 weeks ago

Oracle releases FIPS-validated crypto module for Java

Oracle Jipher enhances cryptographic services with FIPS-140 compliance for Java developers using the JCA framework.
#bitcoin
Cryptocurrency
fromBitcoin Magazine
1 month ago

Project Eleven To Award 1 BTC To Tackle Bitcoin's Quantum Vulnerability

Project Eleven launched the Q-Day Prize, offering 1 BTC for breaking ECC cryptography using Shor's algorithm on a quantum computer.
Cryptocurrency
fromBitcoin Magazine
1 month ago

Project Eleven To Award 1 BTC To Tackle Bitcoin's Quantum Vulnerability

Project Eleven launched the Q-Day Prize, offering 1 BTC for breaking ECC cryptography using Shor's algorithm on a quantum computer.
#artificial-intelligence
Artificial intelligence
fromWIRED
2 months ago

AI Thinks It Cracked Kryptos. The Artist Behind It Says No Chance

Amateur and professional cryptographers continue to struggle with the Kryptos code, particularly the unsolved K4 segment, fueling increased public interest.
fromHackernoon
1 year ago
London startup

Why Lattica's $3.25M Bet on Fully Homomorphic Encryption Could Change AI Privacy Forever | HackerNoon

Artificial intelligence
fromWIRED
2 months ago

AI Thinks It Cracked Kryptos. The Artist Behind It Says No Chance

Amateur and professional cryptographers continue to struggle with the Kryptos code, particularly the unsolved K4 segment, fueling increased public interest.
fromHackernoon
1 year ago
London startup

Why Lattica's $3.25M Bet on Fully Homomorphic Encryption Could Change AI Privacy Forever | HackerNoon

OMG science
fromwww.scientificamerican.com
1 month ago

Alan Turing's Lost Work Could Reveal How Tigers Got Their Stripes

Alan Turing's contributions to mathematics and biology reveal the interconnectedness of his work in cryptography, computing, and pattern formation.
fromSilicon Canals
1 month ago

Amsterdam's Invest-NL takes priority stake in Fox Crypto following NCC Group divestment: Know more - Silicon Canals

Rinke Zonneveld, CEO of Invest-NL, states that Invest-NL's investment safeguards the Netherlands' leading role in cryptography, particularly during this critical period of transition.
NYC startup
Women in technology
fromwww.nytimes.com
1 month ago

Betty Webb, Who Helped Bletchley Park Code Breakers, Dies at 101

Charlotte Webb, a pivotal Bletchley Park codebreaker, passed away at 101, leaving behind a legacy of significant contributions to WWII cryptography.
fromInfoQ
1 month ago

How to Compute Without Looking: A Sneak Peek into Secure Multi-Party Computation

Secure Multi-Party Computation (SMPC) allows multiple parties to compute functions collaboratively while ensuring that individual inputs remain private, highly relevant in untrustworthy settings.
Games
#quantum-computing
OMG science
fromCSO Online
2 months ago

Researchers claim their protocol can create truly random numbers on a current quantum computer

Quantum computers can generate truly random numbers, aiding cryptographic implementations despite current limitations in their problem-solving capabilities.
OMG science
fromCSO Online
2 months ago

Researchers claim their protocol can create truly random numbers on a current quantum computer

Quantum computers can generate truly random numbers, aiding cryptographic implementations despite current limitations in their problem-solving capabilities.
Information security
fromThe Hacker News
3 months ago

Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats

Google Cloud introduces quantum-safe digital signatures to protect encryption systems against future quantum computing threats.
fromHackernoon
1 year ago

Build (And Then Crack) Your First Message Encryption Protocol With This Guide | HackerNoon

One of the main advantages of XOR is its reversibility. Applying XOR between the ciphertext and the key retrieves the original message.
Miscellaneous
fromHackernoon
1 year ago

Modern Hashing With Go: A Guide | HackerNoon

In Go, hashing is categorized into two main types: non-cryptographic hashes like FNV for speed, and cryptographic hashes like SHA-256 for security.
JavaScript
fromCoindesk
7 months ago

Buenos Aires Adds ZK Proofs to City App in Bid to Boost Residents' Privacy

The service, QuarkID, has been integrated into miBA, the city's seven-year-old app for accessing municipal services and documents. The idea, in short, is to give 3.6 million porteños - residents of Buenos Aires - greater control over their personal information. The ZK proofs will let users show that a document has indeed been authenticated by the government without disclosing information that is irrelevant to the task at hand.
Miscellaneous
fromHackernoon
1 year ago

EOS Network significantly Upgrades With 1-Second Transaction Finality | HackerNoon

"With the Spring 1.0 upgrade and the introduction of the Savanna consensus algorithm, we're achieving something rare in the blockchain world: changing our core consensus algorithm. Very few Layer 1 blockchains have ever done this. In doing so, we're standing on hallowed ground."
Cryptocurrency
[ Load more ]