Bluesky Facebook Reddit Email

Accelerating drug discovery by crowdsourcing confidential data

Researchers developed a secure multiparty computation protocol to facilitate collaboration among pharmaceutical companies and laboratories without revealing confidential data. The approach improved the ability of predictive models to identify new therapeutic candidates at an unprecedented scale and rate.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Cryptographic protocol enables greater collaboration in drug discovery

MIT researchers developed a cryptographic system to securely analyze massive pharmacological datasets, enabling broad pooling of sensitive data for predictive drug discovery. The neural network identified novel interactions, including one with leukemia drug imatinib and an enzyme ErbB4, which could have clinical significance.

Trailblazer in computational complexity theory to receive Knuth Priize

Johan Torkel Håstad of KTH Royal Institute of Technology is awarded the 2018 Donald E. Knuth Prize for his significant contributions to computer science, including optimization and cryptography. The prize recognizes his transformative techniques that have influenced subsequent work in these areas.

Email encryption standards hacked

Researchers demonstrated that two common email encryption standards are vulnerable to attacks, compromising secure communication. The S/MIME standard is not suitable for secure communication due to outdated cryptography, while OpenPGP can be configured securely but often isn't.

Sky & Telescope Pocket Sky Atlas, 2nd Edition

Sky & Telescope Pocket Sky Atlas, 2nd Edition is a durable star atlas for planning sessions, identifying targets, and teaching celestial navigation.

Towards sustainable blockchains

Researchers at IST Austria propose using disk space instead of computational power to secure blockchains, reducing energy consumption and promoting sustainability. The 'proofs of sequential work' approach has the potential to revolutionize blockchain design, offering a more eco-friendly alternative to traditional proof-of-work systems.

For nuclear weapons reduction, a way to verify without revealing

Researchers at MIT have developed a physics-based system to verify the destruction of nuclear warheads, using cryptographic keys in physical form. The new method uses neutron detection and resonance processes to identify authentic warheads, while concealing their designs.

Attacks on 4G LTE networks could send fake emergency alerts

Researchers from Purdue University have identified several new vulnerabilities in 4G LTE networks that could be exploited by hackers to forge the location of a mobile device and fabricate messages. The attacks, including authentication relay and denial of service attacks, were validated through experimentation on a real testbed.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Energy-efficient encryption for the internet of things

MIT researchers have developed a new chip that consumes only 1/400 as much power as software execution of public-key encryption protocols, executing 500 times faster. The chip uses a general-purpose elliptic-curve design and features a dedicated inverter circuit to increase energy efficiency and reduce surface area.

The ultimate defense against hackers may be just a few atoms thick

Researchers at NYU Tandon School of Engineering have introduced a new class of unclonable cybersecurity primitives made from low-cost nanomaterials with high structural randomness. These primitives can be used to securely encrypt and authenticate computer hardware and data physically, rather than through programming.

'The dark side' of quantum computers

Quantum computers threaten to destroy current internet security methods as they can break RSA and ECC systems in days or hours. Researchers like Tanja Lange are working on alternative systems, including a $3.9 million EU-funded research consortium.

System piggybacks on Bitcoin to prevent identity theft

Researchers from MIT's Computer Science and Artificial Intelligence Laboratory have developed a new system called Catena that uses Bitcoin's security machinery to defend against online identity theft and equivocation. The system requires the download of only about 40 megabytes of data, making it suitable for smartphones.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

New research horizons

Two UCSB faculty members, Stefano Tessaro and Andrea Young, have been selected as recipients of the prestigious Alfred P. Sloan Research Fellowship for their outstanding contributions to cryptography and condensed matter physics. The fellowships will support their research efforts in building solid theoretical foundations for cryptogra...

Researchers devise secure, efficient anonymity network

A new anonymity scheme called Riffle provides strong security guarantees while using bandwidth efficiently. The system employs a mixnet with onion encryption and uses authentication encryption to verify the authenticity of messages, ensuring cryptographically secure communication as long as one server remains uncompromised.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

Cryptographic system lets users control access to their data

Researchers at MIT and Harvard University have developed a new cryptographic system called Sieve that allows users to store and manage their personal data securely. With Sieve, users can control which apps have access to their data and revoke access with ease.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

Raising cryptography's standards

Researchers at MIT and Maynooth University developed a mathematical framework to calculate the minimum-security guarantees for any given encryption scheme. This allows information managers to make more informed decisions about how to protect data. The framework also applies to data privacy, enabling the modification or structuring of a...

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

Collecting digital user data without invading privacy

A team of computer scientists from Saarland University has developed a software system called Privada, which enables website owners to collect user data while protecting individual privacy. The system uses multi-party computation and perturbation to ensure that only trends in the aggregated statistic are preserved.

New system allows cloud customers to detect program-tampering

A new system enables cloud customers to quickly verify the proper execution of their software, protecting against malicious code and ensuring data privacy. The system uses a practical, succinct zero-knowledge proof that can fit in a single data packet.

Thwarting the cleverest attackers

Researchers at MIT have developed a technique to mitigate side-channel attacks, which can steal computer secrets by analyzing time it takes for a computer to store data or measure its power consumption. This approach obscures computational details, making it difficult for attackers to infer information about the program.

Cryptographic attack highlights the importance of bug-free software

A new attack was discovered that can bypass security provided by OpenSSL, a widely used cryptography toolkit. The attack targets a specific version of the software and requires a specific set of options to work, but highlights the need for formal verification and correctness in open source software.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

Computer scientist cracks mysterious 'Copiale Cipher'

A team of international researchers, led by computer scientist Kevin Knight, has finally broken the 75,000-character Copiale Cipher after centuries. The decoded message reveals rituals and political leanings of an 18th-century German secret society, shedding new light on its role in history.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

Major step ahead for cryptography

A new encryption scheme developed by Professor Nigel Smart allows for computations to be performed on encrypted data, enabling secure storage and access of sensitive information. This technology has the potential to revolutionize fields such as medical care research and electronic voting, while maintaining patient privacy.

Math plus cryptography equals drama and conflict

The intersection of mathematics and cryptography has significant implications for security and research, with mathematicians like Neal Koblitz contributing to the field. Koblitz's work highlights the challenges of 'provable security' in cryptography, as well as the influence of the National Security Agency on research.

How to leak a secret and not get caught

WikiLeaks, an online service designed to allow anyone to post sensitive government documents without being traced, is set to launch. The site aims to protect whistle-blowers and journalists from jail sentences for emailing sensitive information; however, concerns remain about the misuse of its anonymity feature.

Updated federal guide on cryptography available

The NIST Special Publication 800-21-1 provides guidelines for implementing cryptography in the federal government. The publication aims to improve IT security and facilitate FISMA compliance among federal agencies, ensuring protection of sensitive information and systems.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

Cryptography and coding for kids

Professors Vera Pless and Janet Beissinger create educational games to teach kids about cryptography and coding theory, making math accessible and fun. The project aims to help youngsters understand the importance of coding in business security and online safety.

You don't need to stop procrastinating

Researchers found that calculations taking longer than 26 months on current hardware are not worth starting. Instead, delaying until a more powerful computer is available can save time and resources. This strategy allows for optimal use of limited budgets for computers.

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.