What's up in

computer security

<p>A new paper claims that a common digital security system could be tweaked to withstand attacks even from a powerful quantum computer.</p>
Abstractions blog

Why Quantum Computers Might Not Break Cryptography

A new paper claims that a common digital security system could be tweaked to withstand attacks even from a powerful quantum computer.

<p>Computer scientists can prove certain programs to be error-free with the same certainty that mathematicians prove theorems.</p>
computer security

Hacker-Proof Code Confirmed

Computer scientists can prove certain programs to be error-free with the same certainty that mathematicians prove theorems.

<p>In the drive to safeguard data from future quantum computers, cryptographers have stumbled upon a thin red line between security and efficiency.</p>
cryptography

A Tricky Path to Quantum-Safe Encryption

In the drive to safeguard data from future quantum computers, cryptographers have stumbled upon a thin red line between security and efficiency.

<p>A recent cryptographic breakthrough has proven difficult to put into practice. But new advances show how near-perfect computer security might be surprisingly close at hand.</p>
Computer Science

A New Design for Cryptography’s Black Box

A recent cryptographic breakthrough has proven difficult to put into practice. But new advances show how near-perfect computer security might be surprisingly close at hand.

<p>In a watershed moment for cryptography, computer scientists have proposed a solution to a fundamental problem called “program obfuscation.”</p>
Computer Science

Perfecting the Art of Sensible Nonsense

In a watershed moment for cryptography, computer scientists have proposed a solution to a fundamental problem called “program obfuscation.”

<p>A mathematical technique called “differential privacy” gives researchers access to vast repositories of personal data while meeting a high standard for privacy protection.</p>
cryptography

Privacy by the Numbers: A New Approach to Safeguarding Data

A mathematical technique called “differential privacy” gives researchers access to vast repositories of personal data while meeting a high standard for privacy protection.