153 Results for

cryptography

Article

Cryptography scientists win 2012 Turing Award

Association for Computing Machinery bestows its award on Shafi Goldwasser and Silvio Micali for pioneering technology in Internet security.

By March 13, 2013

Article

Researchers find flaw in key generation with popular cryptography

Small percentage of public keys in sample found online were not randomly generated as they should be, paper says.

By February 14, 2012

Article

Google's Keyczar designed to make cryptography easier

This open-source project is meant to help developers implement secure and simple cryptography.

By August 12, 2008

Article

Crypto, security, comp-sci specialists speak out on NSA

In an open letter, more than 50 luminaries in computer science, cryptography, and security join together to decry reported efforts by the agency to undermine encryption and network security.

By January 24, 2014

Article

NSA seeks 'groundbreaking' spying powers, new leak reveals

The US government's spying budget includes funds to invent new technologies "to defeat adversarial cryptography and exploit Internet traffic," leaked documents show.

By August 29, 2013

Video

Ep. 1251: Where we find the cypher in the sound

Leaked from today's show: Facebook cryptography, steganography in social media, crowd-sourcing a witch hunt, and demonic portraits purposely hidden beneath waves of electronic music.

By April 17, 2013

Article

The 404 1,251: Where we find the cipher in the sound (podcast)

Leaked from today's show: Facebook cryptography, steganography in social media, crowd-sourcing a witch hunt, and demonic portraits purposely hidden beneath waves of electronic music.

By April 17, 2013

Article

New tool cracks Apple iWork passwords

Russian cryptography company ElcomSoft has developed a tool that makes cracking iWork document passwords easier.

By February 10, 2012

Article

Quantum crypto cracked, researchers say

Researchers claim to have cracked the quantum cryptography equipment used to cloak highly sensitive communications by banks and defense agencies.

By September 1, 2010

Article

How one company stays safe with two networks

Cryptography Research dodges computer attacks by having employees do Web surfing and e-mail on one network and sensitive work on another that's not connected to the Internet.

By March 30, 2010