#cryptography

[ follow ]
#ed25519
Digital life
fromHackernoon
4 months ago

Meet Ed25519, The Tiny Crypto Algorithm That Makes Solana Insanely Fast and Secure | HackerNoon

Ed25519 is an efficient asymmetric cryptographic algorithm optimized for digital signatures, ideal for high-performance systems and resistant to various cryptographic attacks.
Digital life
fromHackernoon
4 months ago

Meet Ed25519, The Tiny Crypto Algorithm That Makes Solana Insanely Fast and Secure | HackerNoon

Ed25519 is an efficient asymmetric cryptographic algorithm optimized for digital signatures, ideal for high-performance systems and resistant to various cryptographic attacks.
fromHackernoon
1 year ago

Cryptography's Developer Dilemma: An Urgent Call for API Research | HackerNoon

We clustered 91,954 cryptography-related questions on Stack Overflow and manually analyzed 383 to comprehend the crypto challenges developers face. Developers showed a lack of knowledge of fundamental concepts.
Cryptocurrency
fromTheregister
1 week ago

The EFF turns 35, but there's plenty more to do

The organization has since been prominent in some of the most important legal battles for privacy, online operations, and legislative correction.
Privacy professionals
#quantum-computing
Cryptocurrency
fromHackernoon
1 month ago

Hack Today, Crack Tomorrow? How Quantum-Safe Tools Save Blockchain's Future | HackerNoon

Quantum computing poses significant vulnerabilities to current blockchain cryptography based on ECC and RSA.
fromHackernoon
1 month ago
Cryptocurrency

Hack Today, Crack Tomorrow? How Quantum-Safe Tools Save Blockchain's Future | HackerNoon

#bitcoin
#privacy
Cryptocurrency
fromInfoWorld
1 month ago

Bringing post-quantum cryptography to Windows

Post-quantum cryptography addresses vulnerabilities of conventional and quantum computing, focusing on securing valuable information.
#blockchain
fromHackernoon
1 year ago
Cryptocurrency

Zama Raises $57M In Series B To Bring End-to-End Encryption To Public Blockchains | HackerNoon

fromHackernoon
1 year ago
Privacy technologies

Zero-Knowledge, Zero Limits: The Vision Behind Aleo's New Blockchain Paradigm | HackerNoon

fromHackernoon
1 year ago
Cryptocurrency

Zama Raises $57M In Series B To Bring End-to-End Encryption To Public Blockchains | HackerNoon

fromHackernoon
1 year ago
Privacy technologies

Zero-Knowledge, Zero Limits: The Vision Behind Aleo's New Blockchain Paradigm | HackerNoon

fromHackernoon
2 months ago

Cutting Private Key Backup Failures by 6 Orders of Magnitude | HackerNoon

The proposed backup methods provide enhanced security and reliability for private key recovery.
Trustees have only permission, while the owner retains possession, improving overall security.
Cryptocurrency
fromTechzine Global
2 months ago

Windows 11 will feature cryptography that can withstand quantum computers

Windows 11 now incorporates support for post-quantum cryptography to secure data against future quantum computing threats.
fromInfoQ
2 months ago

OpenJDK News Roundup: Key Derivation, Scoped Values, Compact Headers, JFR Method Timing & Tracing

JEP 510 proposes the finalization of the Key Derivation Function API after one round of preview, enhancing cryptographic capabilities in Java.
Java
Scala
fromHackernoon
4 months ago

Go 1.22: Bringing Math/rand and Crypto/rand together | HackerNoon

Go 1.22 enhances random number generation by integrating cryptographic sources into the math/rand package, improving randomness and mitigating misuse risks.
fromComputerWeekly.com
2 months ago

Preparing for post quantum computing will be more difficult than the millenium bug | Computer Weekly

The transformation needed for organisations in the UK to be ready for the threat of post-quantum computing will make preparations for the millennium bug look easy, cyber chiefs said today.
Information security
fromNextgov.com
2 months ago

Signal clone used by Waltz to archive messages suspends services after reported hack

TeleMessage suspended its services after a hacker breached internal materials, including sensitive information related to U.S. Customs and Border Protection.
Information security
fromTechiediaries
3 months ago

Generate and Crack Passwords with Python and Ethical Considerations

Python's secrets module offers secure password generation by utilizing cryptographically strong random number generators.
Following best practices in password creation significantly enhances security against unauthorized access.
fromInfoWorld
3 months ago

Oracle releases FIPS-validated crypto module for Java

Oracle's Jipher introduces a FIPS-140 validated OpenSSL module for Java developers, enhancing security within the standard Java Cryptography Architecture framework.
Java
Java
fromOracle
3 months ago

Jipher: Java Cryptographic Service Provider for FIPS Environments

Oracle Jipher enables Java applications to meet FIPS 140-2 requirements with a validated cryptographic module.
fromwww.scientificamerican.com
3 months ago

This Cutting-Edge Encryption Originates in Renaissance Art and Math

Renaissance art's perspective laws influenced Western art and led to modern cryptographic techniques used in Bitcoin.
fromHackernoon
1 year ago

Why Lattica's $3.25M Bet on Fully Homomorphic Encryption Could Change AI Privacy Forever | HackerNoon

Lattica's technology enables AI to process data privately using Fully Homomorphic Encryption, addressing major privacy concerns.
Cryptocurrency
fromHackernoon
1 year ago

The HackerNoon Newsletter: xAI's Grok 3: All the GPUs, None of the Breakthroughs (4/17/2025) | HackerNoon

Elon Musk's Grok 3 is touted as the world's best AI, sparking comparisons with competitors like GPT-4o and Claude 3.7.
OMG science
fromwww.scientificamerican.com
3 months ago

Alan Turing's Lost Work Could Reveal How Tigers Got Their Stripes

Alan Turing's contributions to mathematics and biology reveal the interconnectedness of his work in cryptography, computing, and pattern formation.
NYC startup
fromSilicon Canals
3 months ago

Amsterdam's Invest-NL takes priority stake in Fox Crypto following NCC Group divestment: Know more - Silicon Canals

Invest-NL has acquired a stake in Fox Crypto to enhance the Netherlands' cryptographic capabilities at the request of various Dutch ministries.
Women in technology
fromwww.nytimes.com
3 months ago

Betty Webb, Who Helped Bletchley Park Code Breakers, Dies at 101

Charlotte Webb, a pivotal Bletchley Park codebreaker, passed away at 101, leaving behind a legacy of significant contributions to WWII cryptography.
#cybersecurity
Privacy professionals
fromWIRED
4 months ago

Cybersecurity Professor Mysteriously Disappears as FBI Raids His Homes

A prominent computer scientist, Xiaofeng Wang, has vanished amid an FBI investigation, raising significant concerns in academic circles about privacy and security.
Privacy professionals
fromWIRED
4 months ago

Cybersecurity Professor Mysteriously Disappears as FBI Raids His Homes

A prominent computer scientist, Xiaofeng Wang, has vanished amid an FBI investigation, raising significant concerns in academic circles about privacy and security.
Games
fromInfoQ
4 months ago

How to Compute Without Looking: A Sneak Peek into Secure Multi-Party Computation

Secure Multi-Party Computation enables collaborative computations without data disclosure, ensuring privacy in low-trust environments.
It is applicable across multiple industries including finance, cloud computing, and healthcare, highlighting its versatility.
Techniques like secret-sharing and the Envelope Trick enhance data security and collaboration for sensitive computations.
Privacy professionals
fromArs Technica
4 months ago

FBI raids home of prominent computer scientist who has gone incommunicado

Xiaofeng Wang, a prominent professor, has gone missing amidst FBI raids and communications removal, sparking speculation about serious allegations.
fromHackernoon
4 months ago

No Waiting, No Mempool: How Solana Moves Crypto at Lightning Speed | HackerNoon

A Solana transaction consists of cryptographically signed instructions from accounts which, when initiated, update the blockchain network, ensuring secure communication and processing.
Deliverability
Artificial intelligence
fromWIRED
4 months ago

AI Thinks It Cracked Kryptos. The Artist Behind It Says No Chance

Amateur and professional cryptographers continue to struggle with the Kryptos code, particularly the unsolved K4 segment, fueling increased public interest.
Information security
fromThe Hacker News
5 months ago

Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats

Google Cloud introduces quantum-safe digital signatures to protect encryption systems against future quantum computing threats.
fromHackernoon
1 year ago

Build (And Then Crack) Your First Message Encryption Protocol With This Guide | HackerNoon

XOR encryption is simple, reversible, and supports multiple keys, making it a foundation of modern cryptographic protocols.
fromHackernoon
2 years ago

Modern Hashing With Go: A Guide | HackerNoon

In Go, hashing is categorized into two main types: non-cryptographic hashes like FNV for speed, and cryptographic hashes like SHA-256 for security.
JavaScript
fromCoindesk
9 months ago

Buenos Aires Adds ZK Proofs to City App in Bid to Boost Residents' Privacy

The service, QuarkID, has been integrated into miBA, the city's seven-year-old app for accessing municipal services and documents. The idea, in short, is to give 3.6 million porteños - residents of Buenos Aires - greater control over their personal information. The ZK proofs will let users show that a document has indeed been authenticated by the government without disclosing information that is irrelevant to the task at hand.
Miscellaneous
Cryptocurrency
fromHackernoon
1 year ago

EOS Network significantly Upgrades With 1-Second Transaction Finality | HackerNoon

EOS Network successfully upgraded to Spring 1.0, introducing the Savanna consensus algorithm, resulting in unprecedented 1-second transaction finality.
[ Load more ]