#cryptography

[ follow ]
fromWIRED
4 days ago

The Kryptos Key Is Going Up for Sale

"I wanted to be of sound mind and body when it happened, so I could control it in some way," says Sanborn, who is turning 80 around the time the bidding will commence in November.
Cryptocurrency
fromHackernoon
1 year ago

Cryptography's Developer Dilemma: An Urgent Call for API Research | HackerNoon

We clustered 91,954 cryptography-related questions on Stack Overflow and manually analyzed 383 to comprehend the crypto challenges developers face. Developers showed a lack of knowledge of fundamental concepts.
Cryptocurrency
fromTheregister
3 weeks ago

The EFF turns 35, but there's plenty more to do

The organization has since been prominent in some of the most important legal battles for privacy, online operations, and legislative correction.
Privacy professionals
#quantum-computing
#bitcoin
fromBitcoin Magazine
1 month ago

White Noise: Anonymous Nostr DMs And Encrypted Group Chat

White Noise is a privacy-centric messaging app leveraging Nostr's decentralized identity and MLS protocol to enhance secure communication.
Cryptocurrency
fromInfoWorld
1 month ago

Bringing post-quantum cryptography to Windows

Post-quantum cryptography addresses vulnerabilities of conventional and quantum computing, focusing on securing valuable information.
#blockchain
fromHackernoon
1 year ago
Cryptocurrency

Zama Raises $57M In Series B To Bring End-to-End Encryption To Public Blockchains | HackerNoon

fromHackernoon
1 year ago
Privacy technologies

Zero-Knowledge, Zero Limits: The Vision Behind Aleo's New Blockchain Paradigm | HackerNoon

fromHackernoon
1 year ago
Cryptocurrency

Zama Raises $57M In Series B To Bring End-to-End Encryption To Public Blockchains | HackerNoon

fromHackernoon
1 year ago
Privacy technologies

Zero-Knowledge, Zero Limits: The Vision Behind Aleo's New Blockchain Paradigm | HackerNoon

fromHackernoon
2 months ago

Cutting Private Key Backup Failures by 6 Orders of Magnitude | HackerNoon

The proposed backup methods provide enhanced security and reliability for private key recovery.
Trustees have only permission, while the owner retains possession, improving overall security.
Cryptocurrency
fromTechzine Global
2 months ago

Windows 11 will feature cryptography that can withstand quantum computers

Windows 11 now incorporates support for post-quantum cryptography to secure data against future quantum computing threats.
fromInfoQ
3 months ago

OpenJDK News Roundup: Key Derivation, Scoped Values, Compact Headers, JFR Method Timing & Tracing

JEP 510 proposes the finalization of the Key Derivation Function API after one round of preview, enhancing cryptographic capabilities in Java.
Java
Scala
fromHackernoon
4 months ago

Go 1.22: Bringing Math/rand and Crypto/rand together | HackerNoon

Go 1.22 enhances random number generation by integrating cryptographic sources into the math/rand package, improving randomness and mitigating misuse risks.
Information security
fromComputerWeekly.com
3 months ago

Preparing for post quantum computing will be more difficult than the millenium bug | Computer Weekly

UK organizations must prepare for post-quantum computing, a complex task anticipated to be greater than preparation for the millennium bug.
fromNextgov.com
3 months ago

Signal clone used by Waltz to archive messages suspends services after reported hack

TeleMessage suspended its services after a hacker breached internal materials, including sensitive information related to U.S. Customs and Border Protection.
Information security
fromTechiediaries
3 months ago

Generate and Crack Passwords with Python and Ethical Considerations

Python's secrets module offers secure password generation by utilizing cryptographically strong random number generators.
Following best practices in password creation significantly enhances security against unauthorized access.
fromInfoWorld
3 months ago

Oracle releases FIPS-validated crypto module for Java

Oracle's Jipher introduces a FIPS-140 validated OpenSSL module for Java developers, enhancing security within the standard Java Cryptography Architecture framework.
Java
Java
fromOracle
3 months ago

Jipher: Java Cryptographic Service Provider for FIPS Environments

Oracle Jipher enables Java applications to meet FIPS 140-2 requirements with a validated cryptographic module.
fromwww.scientificamerican.com
3 months ago

This Cutting-Edge Encryption Originates in Renaissance Art and Math

Renaissance art's perspective laws influenced Western art and led to modern cryptographic techniques used in Bitcoin.
fromHackernoon
1 year ago

Why Lattica's $3.25M Bet on Fully Homomorphic Encryption Could Change AI Privacy Forever | HackerNoon

Lattica's technology enables AI to process data privately using Fully Homomorphic Encryption, addressing major privacy concerns.
Cryptocurrency
fromHackernoon
1 year ago

The HackerNoon Newsletter: xAI's Grok 3: All the GPUs, None of the Breakthroughs (4/17/2025) | HackerNoon

Elon Musk's Grok 3 is touted as the world's best AI, sparking comparisons with competitors like GPT-4o and Claude 3.7.
OMG science
fromwww.scientificamerican.com
4 months ago

Alan Turing's Lost Work Could Reveal How Tigers Got Their Stripes

Alan Turing's contributions to mathematics and biology reveal the interconnectedness of his work in cryptography, computing, and pattern formation.
NYC startup
fromSilicon Canals
4 months ago

Amsterdam's Invest-NL takes priority stake in Fox Crypto following NCC Group divestment: Know more - Silicon Canals

Invest-NL has acquired a stake in Fox Crypto to enhance the Netherlands' cryptographic capabilities at the request of various Dutch ministries.
[ Load more ]