Researchers developed a secure multiparty computation protocol to facilitate collaboration among pharmaceutical companies and laboratories without revealing confidential data. The approach improved the ability of predictive models to identify new therapeutic candidates at an unprecedented scale and rate.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
MIT researchers developed a cryptographic system to securely analyze massive pharmacological datasets, enabling broad pooling of sensitive data for predictive drug discovery. The neural network identified novel interactions, including one with leukemia drug imatinib and an enzyme ErbB4, which could have clinical significance.
Johan Torkel Håstad of KTH Royal Institute of Technology is awarded the 2018 Donald E. Knuth Prize for his significant contributions to computer science, including optimization and cryptography. The prize recognizes his transformative techniques that have influenced subsequent work in these areas.
A new cryptographic system, AUDIT, is proposed to improve government surveillance accountability while maintaining confidentiality. The system uses a public ledger and cryptographic commitments to ensure transparency and accountability.
A researcher at MSU developed an algorithm to improve information security tools by reducing the complexity of scalar multiplication in elliptical curve transformations. The new algorithm achieves a 5% reduction in precomputation stage complexity and a 4% reduction in main stage complexity.
Researchers demonstrated that two common email encryption standards are vulnerable to attacks, compromising secure communication. The S/MIME standard is not suitable for secure communication due to outdated cryptography, while OpenPGP can be configured securely but often isn't.
Sky & Telescope Pocket Sky Atlas, 2nd Edition
Sky & Telescope Pocket Sky Atlas, 2nd Edition is a durable star atlas for planning sessions, identifying targets, and teaching celestial navigation.
Researchers at IST Austria propose using disk space instead of computational power to secure blockchains, reducing energy consumption and promoting sustainability. The 'proofs of sequential work' approach has the potential to revolutionize blockchain design, offering a more eco-friendly alternative to traditional proof-of-work systems.
Researchers at MIT have developed a physics-based system to verify the destruction of nuclear warheads, using cryptographic keys in physical form. The new method uses neutron detection and resonance processes to identify authentic warheads, while concealing their designs.
Researchers from Purdue University have identified several new vulnerabilities in 4G LTE networks that could be exploited by hackers to forge the location of a mobile device and fabricate messages. The attacks, including authentication relay and denial of service attacks, were validated through experimentation on a real testbed.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
MIT researchers have developed a new chip that consumes only 1/400 as much power as software execution of public-key encryption protocols, executing 500 times faster. The chip uses a general-purpose elliptic-curve design and features a dedicated inverter circuit to increase energy efficiency and reduce surface area.
Researchers at NYU Tandon School of Engineering have introduced a new class of unclonable cybersecurity primitives made from low-cost nanomaterials with high structural randomness. These primitives can be used to securely encrypt and authenticate computer hardware and data physically, rather than through programming.
Quantum computers threaten to destroy current internet security methods as they can break RSA and ECC systems in days or hours. Researchers like Tanja Lange are working on alternative systems, including a $3.9 million EU-funded research consortium.
Using a cryptographic approach, Stanford researchers can identify disease-associated genes without revealing individual genetic information. The 'genome cloaking' technique enables researchers to analyze genomic data in aggregate and report on findings relevant to the study, protecting participants' privacy.
Researchers from MIT's Computer Science and Artificial Intelligence Laboratory have developed a new system called Catena that uses Bitcoin's security machinery to defend against online identity theft and equivocation. The system requires the download of only about 40 megabytes of data, making it suitable for smartphones.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
Researchers Joël Alwen and Krzysztof Pietrzak proved the existence of memory-hard functions, essential for securing password servers and decentralized cryptocurrencies. Their work enhances understanding of these functions and increases trust in using scrypt for password hashing.
Two UCSB faculty members, Stefano Tessaro and Andrea Young, have been selected as recipients of the prestigious Alfred P. Sloan Research Fellowship for their outstanding contributions to cryptography and condensed matter physics. The fellowships will support their research efforts in building solid theoretical foundations for cryptogra...
Researchers at Tohoku University have developed a new technique for compressing Galois field arithmetic operations, resulting in the world's most efficient AES cryptographic processing circuit. This breakthrough enables the use of encryption technology in IoT devices with tight energy constraints, enhancing safety and security.
A new anonymity scheme called Riffle provides strong security guarantees while using bandwidth efficiently. The system employs a mixnet with onion encryption and uses authentication encryption to verify the authenticity of messages, ensuring cryptographically secure communication as long as one server remains uncompromised.
Belgian researchers are developing a new security approach for microchips using complex mathematical algorithms and 'lightweight security armour'. The five-year project aims to protect devices such as pacemakers, smartwatches, and cars from cyberattacks.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
Researchers at MIT and Harvard University have developed a new cryptographic system called Sieve that allows users to store and manage their personal data securely. With Sieve, users can control which apps have access to their data and revoke access with ease.
Researchers at IST Austria have received ERC Starting Grants for their innovative projects in biochemistry and computer science, exploring the mechanisms of self-organizing properties of bacterial cells and developing new cryptographic schemes.
A new messaging system, Vuvuzela, provides strong mathematical guarantees of user anonymity while allowing for fast communication. The system uses three servers and encryption layers to confuse adversaries and prevent them from inferring communication patterns.
Researchers verify secure Wireless Key Distribution in a real outdoor environment using concurrent service data transmission. The method achieves satisfactory statistical properties and satisfies criteria of randomness with a key generation rate of approximately 0.1 bits per second.
Apple iPad Pro 11-inch (M4)
Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.
Researchers have developed a method to protect user anonymity and prevent fraud in Bitcoin transactions. The CoinShuffle protocol, which uses a decentralized approach similar to the Tor network, can be easily incorporated into current Bitcoin programs.
Researchers at MIT and Maynooth University developed a mathematical framework to calculate the minimum-security guarantees for any given encryption scheme. This allows information managers to make more informed decisions about how to protect data. The framework also applies to data privacy, enabling the modification or structuring of a...
Computer scientists at UC San Diego have developed a tool to test security in hardware design, addressing the growing concern of device vulnerabilities. The tool can detect confidentiality and integrity breaches, such as timing channels and critical subsystem interference.
Saarland University researchers have created a software system called Ubic to enhance the security of cash machine transactions using Google Glass. The system encrypts and protects users' PIN numbers, making it difficult for unauthorized individuals to spy on the transaction process.
Aranet4 Home CO2 Monitor
Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.
A team of computer scientists from Saarland University has developed a software system called Privada, which enables website owners to collect user data while protecting individual privacy. The system uses multi-party computation and perturbation to ensure that only trends in the aggregated statistic are preserved.
A new system enables cloud customers to quickly verify the proper execution of their software, protecting against malicious code and ensuring data privacy. The system uses a practical, succinct zero-knowledge proof that can fit in a single data packet.
Researchers at MIT have developed a technique to mitigate side-channel attacks, which can steal computer secrets by analyzing time it takes for a computer to store data or measure its power consumption. This approach obscures computational details, making it difficult for attackers to infer information about the program.
A new attack was discovered that can bypass security provided by OpenSSL, a widely used cryptography toolkit. The attack targets a specific version of the software and requires a specific set of options to work, but highlights the need for formal verification and correctness in open source software.
DJI Air 3 (RC-N2)
DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.
A team of international researchers, led by computer scientist Kevin Knight, has finally broken the 75,000-character Copiale Cipher after centuries. The decoded message reveals rituals and political leanings of an 18th-century German secret society, shedding new light on its role in history.
Researchers at the University of Michigan have developed a new anticensorship scheme called Telex, which uses public-key steganography to divert connections through participating ISPs. This system could shift the arms race regarding censorship in favor of free speech and access to information.
A research group at UCLA has devised a new method for securing location-sensitive data by leveraging quantum mechanics. This approach eliminates the need for distributing and storing keys, making it more secure than classical methods.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.
A new encryption scheme developed by Professor Nigel Smart allows for computations to be performed on encrypted data, enabling secure storage and access of sensitive information. This technology has the potential to revolutionize fields such as medical care research and electronic voting, while maintaining patient privacy.
The intersection of mathematics and cryptography has significant implications for security and research, with mathematicians like Neal Koblitz contributing to the field. Koblitz's work highlights the challenges of 'provable security' in cryptography, as well as the influence of the National Security Agency on research.
WikiLeaks, an online service designed to allow anyone to post sensitive government documents without being traced, is set to launch. The site aims to protect whistle-blowers and journalists from jail sentences for emailing sensitive information; however, concerns remain about the misuse of its anonymity feature.
The NIST Special Publication 800-21-1 provides guidelines for implementing cryptography in the federal government. The publication aims to improve IT security and facilitate FISMA compliance among federal agencies, ensuring protection of sensitive information and systems.
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
Researchers at the University of California - San Diego will lead three large ITR projects worth up to $12.5 million, focusing on grid computing and decision-making systems. Additionally, UCSD is involved in seven other newly-funded projects, including language modeling and materials science.
Professors Vera Pless and Janet Beissinger create educational games to teach kids about cryptography and coding theory, making math accessible and fun. The project aims to help youngsters understand the importance of coding in business security and online safety.
Researchers found that calculations taking longer than 26 months on current hardware are not worth starting. Instead, delaying until a more powerful computer is available can save time and resources. This strategy allows for optimal use of limited budgets for computers.
Sony Alpha a7 IV (Body Only)
Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.
Researchers have discovered that screensaver keys can be vulnerable to hacking by scanning hard drives for random chunks of data. This could allow hackers to find and crack private signature keys, compromising encryption systems, particularly those on Web servers.