Researchers at Huazhong University of Science and Technology have implemented the first complete public-key encryption system at the physical optical layer. The innovation lies in integrating partially coherent light and reciprocity principles on a single photonic chip to conceal information within random optical fields.
Researchers at the University of Missouri found that using blockchain to track ingredients through the supply chain reduces consumer uncertainty about food safety and increases willingness to pay premium prices. The technology also provides clear information about the source of ingredients, boosting trust in sustainable foods.
A new attack, Infiltrated Selfish Mining (ISM), could reshape the rules of Bitcoin mining by allowing attackers to profit simultaneously. ISM avoids the miner's dilemma and yields up to 1.52 times more rewards than previous attacks.
Apple AirPods Pro (2nd Generation, USB-C)
Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.
Maude-NPA's parallelization significantly reduces analysis time for complex cryptographic protocols. The new method improves runtime performance by an average of 52% and enables formal analysis of quantum-resistant TLS protocols.
Researchers at Kyoto University have characterized quantum advantage by proving an equivalence between its existence and the security of certain cryptographic primitives. This breakthrough implies that when quantum advantage does not exist, many conventional cryptographic primitives are broken, including post-quantum ones.
Researchers developed a cost-effective, wafer-scale thermal emitter for infrared information encryption and decryption. The emitter demonstrates versatile wavelength-, angle-, and polarization-selective optical functionalities across the LWIR spectrum.
Prof. AU Man Ho Allen has been recognized with the prestigious Hong Kong Engineering Science and Technology (HKEST) Award 2024-25 for his outstanding contributions to the Web3 ecosystem and the digital economy. His research focuses on developing practical, secure, and privacy-preserving cryptographic solutions.
Eurocrypt 2025 will bring together leading cryptographic researchers and experts for a four-day conference in Madrid, featuring pre-conference workshops and over 650 participants. IMDEA Software Institute is the main organizer of this event, alongside other top-tier institutions.
GoPro HERO13 Black
GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.
A study by Complexity Science Hub found that in 7.54% of DAOs, a single contributor controlled decisions due to concentrated governance tokens. This raises concerns about the true level of democracy in these organizations, which aim to distribute power and promote fairness and transparency.
A team of researchers from JPMorganChase, Quantinuum, and the University of Texas at Austin have successfully demonstrated certified randomness using a 56-qubit quantum computer. This achievement has significant implications for cryptography, fairness, and privacy, as it enables the generation of truly random numbers that cannot be man...
Evgenios Kornaropoulos at George Mason University will receive a $648,811 NSF CAREER Award to investigate encrypted systems with fine-grained leakage. He aims to develop cryptographic designs with customized efficiency-security trade-offs in various settings.
Researchers have developed a new form of QR code that can protect users from phishing attacks by signaling whether a link is safe or not. The SDMQR codes provide an added layer of security without interfering with existing functionality, allowing companies to replace traditional barcodes with more sophisticated QR codes.
A new cryptographic framework proposes a data sharing scheme that guarantees data integrity without compromising privacy. The protocol uses advanced tools like zero-knowledge proofs to ensure confidentiality and facilitate the analysis of encrypted data.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
A team of researchers has developed a novel technique to steal artificial intelligence (AI) models by monitoring electromagnetic signals. The method allows attackers to recreate the high-level features of an AI model with 99.91% accuracy, potentially undermining intellectual property rights and exposing sensitive data.
MixBuy is the first cryptographic protocol guaranteeing both security and privacy in digital purchases. It hides the relationship between customer and store by using an intermediary to relay payments.
The 11th Heidelberg Laureate Forum brings together 200 young mathematicians and computer scientists to engage with renowned experts on pressing issues like climate change and artificial intelligence. The forum features lectures, panel discussions, and interactive coverage to inspire the next generation of researchers.
Researchers have developed a proposed system to control specific devices on a network, allowing for more efficient and secure control. The system uses a broadcast authentication method, which enables remote control of arbitrary target devices simultaneously.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
Rice University engineers have demonstrated a way to control the optical properties of T centers, paving the way toward leveraging these point defects for building quantum nodes. By embedding a T center in a photonic integrated circuit, they increased the collection efficiency for single photon emission by two orders of magnitude.
Researchers at Linköping University develop a new type of quantum random number generator based on perovskite light emitting diodes, providing improved randomness and security. The technology has the potential to be cheaper and more environmentally friendly than traditional methods.
Researchers at Tohoku University have developed a new cipher system called SCARF, which enhances computer security by protecting against cache side-channel attacks. The innovative system offers exceptional performance and can complete randomization with only half the latency of existing techniques.
The DBST algorithm proposes a novel generalized Feistel variant structure and key-dependent dynamic S-box model to improve diffusion effects. It has demonstrated high security, high throughput rate, and low hardware resources in experiments.
Researchers aim to design practical revocation mechanisms for Web PKI, enabling wider use of TLS certificates. They also address privacy issues, post-quantum security, and code-signing PKI, deploying batching and aggregation techniques.
Sony Alpha a7 IV (Body Only)
Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.
The CONFIDENTIAL6G project aims to enhance the security and reliability of 6G networks, enabling their use in emerging AI tools and IoT devices. IMDEA Software Institute will contribute privacy-preserving computation technologies such as secure multi-party computation and homomorphic encryption.
The Heidelberg Laureate Forum Foundation offers journalist travel grants to cover the 10th HLF from September 24-29, 2023. Recipients of prestigious awards in mathematics and computer science will gather with young researchers for a week of interdisciplinary dialogue.
A team of international codebreakers has deciphered 57 previously unknown letters written by Mary Queen of Scots while imprisoned in England. The letters provide insights into her captivity and communication with French ambassador Michel de Castelnau, including complaints about poor health and negotiations for release.
Researchers at Rensselaer Polytechnic Institute developed a model to predict cryptocurrency scams using Benford's Law and found that scam addresses deviated from the law. They also advocated for robust blockchain interoperability to provide stability in decentralized systems.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
Researchers at MIT have developed a scheme for private information retrieval that is about 30 times faster than other comparable methods. The technique enables users to search an online database without revealing their query to the server, with potential applications in private communication and targeted advertising.
A new algorithm unravels the structure of financial services on the Ethereum blockchain, revealing highly intertwined structures that involve risks not yet fully understood. The findings highlight the need for transparency and awareness among users, regulators, and policymakers to mitigate systemic risks associated with cryptoassets.
Researchers aim to improve detection and removal of hardware trojans, which can disrupt wireless communication and leak sensitive information. The project is part of a public-private partnership aiming to accelerate the translation of research findings into new technologies.
Fluke 87V Industrial Digital Multimeter
Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.
Neuronal silencing periods enable efficient temporal sequence identification, allowing the brain to remember phone numbers and PINs. A new AI mechanism utilizing this mechanism also protects against stolen cards by recognizing personal handwriting style and timing.
MIT researchers found a vulnerable component in computer processors that can be exploited by malicious agents. They developed two mitigation strategies, including scheduling sensitive software on less vulnerable cores and reserving susceptible cores for trusted applications.
A team of researchers at Indian Institute of Science developed a record-breaking true random number generator (TRNG) that uses the random motion of electrons to generate secure random numbers. The device, which is more compact and faster than previous TRNGs, has exceeded NIST standards with a high min-entropy value of 0.98.
Researchers propose a new verifiable searchable symmetric encryption scheme supporting conjunctive keyword queries, enabling both correctness and completeness verifiability without pairing operations. This improves the computational cost in the verification process, making it more efficient.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
Researchers at TU Darmstadt have developed a scalable quantum network that enables secure key exchange and protection of sensitive information. The system uses entanglement-based time-bin coding to distribute photons to users, ensuring robust security against eavesdropping attacks.
Researchers proposed and experimentally demonstrated an all-optical random bit generation method using chaotic pulses quantized in the optical domain. This method generated a 10 Gb/s random bit stream, potentially operable at higher rates by exploiting ultrafast fiber response.
Researchers at North Carolina State University identified a vulnerability in homomorphic encryption that allows data to be stolen during the encryption process. This discovery highlights the need for protection against side-channel attacks, which can compromise even next-generation encryption technologies.
Researchers developed DAGguise, a scheme that shapes memory requests into a predefined pattern to prevent contention attacks and enable faster computation. The technique represents programs' memory access requests as a graph, where each request is stored in a node, and the edges are time dependencies between requests.
Eric Osterweil, George Mason University Assistant Professor, receives $40,000 funding to develop an adaptive encryption platform and threat intelligence information sharing system. The project aims to enable usable cryptographic protections for email transactions and establish a foundation for future cybersecurity efforts.
DJI Air 3 (RC-N2)
DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.
A team of researchers from Ritsumeikan University developed an unprecedented stream cipher using chaos theory to create highly secure cryptographic systems. The new system is resistant to statistical attacks and eavesdropping, even against quantum computers, making it a promising solution for post-quantum era cryptosystems.
A blockchain-based system allows leader robots to signal movements and add transactions to a chain, while malicious leaders forfeit tokens when caught in a lie. This limits the spread of incorrect information and enables follower robots to eventually reach their destination.
Researchers at DGIST developed new algorithms to estimate min-entropy, a key metric for cryptography, using less data and improving speed. The new approach can be used in memory-constrained devices like Internet-of-things devices.
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.
The PICOCRYPT project guarantees the integrity, privacy and effectiveness of computation on data stored in the cloud. Cryptographic techniques will be used to solve problems related to espionage and incorrect results.
Researchers at Graz University of Technology develop a new method of contact discovery that significantly limits privacy threats, using intersection calculations and encryption protocols. The ContactGuard application stores encrypted address book entries on the mobile phone, preventing service providers from accessing sensitive data.
The grant aims to optimize security and energy efficiency for small IoT devices, leveraging cryptography, machine learning, and zero-trust principles.
The research team developed a fast and affordable quantum random number generator, beating all previous records with a speed of 8.05 gigabits per second. This device has promising potential for commercial applications in cryptography and complex systems modeling.
AmScope B120C-5M Compound Microscope
AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.
Scientists at Far Eastern Federal University have developed a method to encode, transmit, and process information using skyrmions. By reducing the size of skyrmions to 10 nm, they aim to achieve high computing power and energy efficiency in future electronics devices.
Researchers at Graz University of Technology discovered a method to exploit Intel processors using power side-channel attacks, even without physical access. The technique uses the RAPL interface and misuses Intel's SGX functionality to extract sensitive data.
A new open-source tool, CRYLOGGER, analyzes thousands of Android apps to detect cryptographic misuses without requiring access to the app's code. The study found that nearly all popular Android apps contain code or use libraries that do not strictly adhere to security standards.
Creality K1 Max 3D Printer
Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.
Researchers from KIST and PNU developed an encryption device that detects circularly polarized light to strengthen IoT security. The device uses a phototransistor with cholesteric liquid crystal and π-conjugated polymer, exhibiting high sensitivity in detecting circular polarization.
Researchers discovered that popular messengers like WhatsApp, Signal, and Telegram allow for large-scale abuse of contact discovery services, exposing sensitive user data. Attackers can build accurate behavior models by querying random phone numbers, enabling them to track users across social networks and public data sources.
Researchers propose a strategy to achieve multiple responsive lasing emission states for high-security optical encryption by modulating the competition between radiative rate of donor and the rate of energy transfer in FRET microlasers. This approach enables dynamic lasing action control, resulting in distinguishable lasing states.
Researchers at Cornell University have identified a problem that holds the key to whether all encryption can be broken. The study connects two areas of mathematics - cryptography and algorithmic information theory - to show that a natural computational problem characterizes the feasibility of basic cryptography.
Cynthia Dwork has received the Knuth Prize for her groundbreaking work on cryptography in network environments, privacy, and foundational contributions to theoretical computer science. Her research transformed several fields, including distributed systems, data privacy, and fairness in algorithmic decision making.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
A cryptographic 'tag of everything' can verify a product's authenticity, with implications for combating losses due to supply chain counterfeiting. The MIT-developed ID chip is small enough for virtually any product, uses photovoltaic diodes for power and backscatter technique for transmission.
Researchers found serious security vulnerabilities in Intel and STMicroelectronics CPUs, which could be used to steal or alter data on billions of devices. The flaws affect laptop, server, tablet, and desktop users worldwide.
A Massachusetts Institute of Technology-developed system automatically generates optimized cryptography code for Google Chrome browsers and web applications, matching performance of handwritten code but faster. The system, known as Fiat Cryptography, is being widely used by tech firms and has populated Google's BoringSSL library.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
Researchers at Stevens Institute of Technology have developed a new encryption system called matchmaking encryption, which allows for secure and private communication. The system uses real-time interactions to verify participants' identities, enabling messages to be sent on a 'dead drop' basis and read at a later date.
The new Easy Email Encryption (E3) app automatically encrypts incoming emails on trusted devices, providing real-world security without requiring technical expertise. With receiver-controlled encryption and per-device key pairs, E3 makes email protection accessible to non-technical users.
Physicists at Kazan Federal University developed a refined simulation of joint reception areas for meteor radio reflections. The study reveals that unpredictable nature of meteors makes signal interception challenging, with practical possibilities disappearing at 30 km distances.
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
MIT researchers developed a cryptographic system to securely analyze massive pharmacological datasets, enabling broad pooling of sensitive data for predictive drug discovery. The neural network identified novel interactions, including one with leukemia drug imatinib and an enzyme ErbB4, which could have clinical significance.