#cryptography

[ follow ]
#quantum-computing
Cryptocurrency
fromBitcoin Magazine
1 week ago

Adam Back Says Quantum Threat To Bitcoin Is Decades Away

Quantum computing poses no immediate threat to Bitcoin's cryptographic security, but preparation for future risks is essential.
Cryptocurrency
fromBitcoin Magazine
1 week ago

Bernstein Pushes Back On Bitcoin Quantum Threat Fears, Says It's Not A Crisis: Report

Quantum computing poses a challenge to Bitcoin, but Bernstein sees it as a manageable protocol evolution rather than an immediate crisis.
Information security
fromArs Technica
3 days ago

Recent advances push Big Tech closer to the Q-Day danger zone

Organizations are transitioning to new algorithms to replace RSA and elliptic curves due to vulnerabilities exposed by quantum computing threats.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

No Consensus Changes Needed: Starkware CPO Builds Quantum-Safe Bitcoin Transactions From Existing Rules

Quantum Safe Bitcoin (QSB) enables secure bitcoin transactions against quantum attacks without protocol changes, costing $75 to $150 per transaction.
Information security
fromTheregister
1 week ago

Cryptographers place $5,000 bet whether quantum will matter

Quantum computing poses a potential threat to cryptography, prompting the development of Post-Quantum Cryptography to address future vulnerabilities.
Cryptocurrency
fromBitcoin Magazine
1 week ago

Adam Back Says Quantum Threat To Bitcoin Is Decades Away

Quantum computing poses no immediate threat to Bitcoin's cryptographic security, but preparation for future risks is essential.
Cryptocurrency
fromBitcoin Magazine
1 week ago

Bernstein Pushes Back On Bitcoin Quantum Threat Fears, Says It's Not A Crisis: Report

Quantum computing poses a challenge to Bitcoin, but Bernstein sees it as a manageable protocol evolution rather than an immediate crisis.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Scarcity Pump or Monetary Suicide? The Radical Argument Against BIP-361

BIP-361 aims to protect bitcoin from quantum threats, but critics warn it could harm bitcoin's value and social contract.
#bitcoin
Cryptocurrency
fromBitcoin Magazine
1 week ago

Bitcoin Could Be Quantum-Safe Without Protocol Changes

A new proposal introduces Quantum Safe Bitcoin to protect transactions from quantum attacks without altering Bitcoin's core rules.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Bitcoin Developers Propose Bitcoin Quantum Migration Plan That Would Freeze Legacy Coins

Bitcoin developers are addressing quantum computing risks with BIP-361, proposing a shift to quantum-resistant cryptography to protect the network.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Bitcoin Developers Propose Freezing Coins That Skip Quantum-Safe Migration Under BIP-361

BIP-361 proposes a five-year timeline for Bitcoin holders to migrate funds from legacy addresses to avoid permanent freezing due to quantum threats.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Presidio Bitcoin Releases Quantum Readiness Paper

Presidio Bitcoin launched a GitHub repository to track research on Bitcoin's quantum vulnerability and potential mitigation strategies.
Cryptocurrency
fromBitcoin Magazine
1 week ago

Bitcoin Policy Institute Warns Quantum Advances Are Compressing Timeline For Network Upgrades

Recent quantum computing advancements may threaten Bitcoin's cryptography sooner than expected, but developers are actively preparing solutions.
Cryptocurrency
fromBitcoin Magazine
1 week ago

Bitcoin Could Be Quantum-Safe Without Protocol Changes

A new proposal introduces Quantum Safe Bitcoin to protect transactions from quantum attacks without altering Bitcoin's core rules.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
History
fromwww.scientificamerican.com
6 days ago

How two mathematicians created an equation that quietly runs the planet

British sailors risked their lives to retrieve Enigma codes from a sinking submarine, aiding in the deciphering of Nazi communications and shortening WWII.
#satoshi-nakamoto
fromTechCrunch
1 week ago
Cryptocurrency

British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto | TechCrunch

fromTechCrunch
1 week ago
Cryptocurrency

British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto | TechCrunch

Node JS
fromYcombinator
2 weeks ago

Show HN: I rewrote my 2012 self-signed cert generator in Go - cert-depot.com | Hacker News

A new certificate generation tool was built in Go, eliminating external dependencies and improving security features.
Information security
fromnews.bitcoin.com
2 weeks ago

Naoris Protocol Deploys Post-Quantum Mainnet to Secure Global Digital Infrastructure

Naoris Protocol launched its Layer 1 mainnet for decentralized post-quantum security, processing over 106 million transactions to combat quantum computing threats.
Information security
fromTheregister
1 month ago

Cryptographer fights RustSec ban over bug reports

Nadim Kobeissi filed a complaint against Rust maintainers over critical bugs in cryptography libraries after facing dismissal and bans.
Cryptocurrency
fromBitcoin Magazine
1 month ago

Bitcoin's Quantum Risk May Be Real, But The Network Is Preparing: Report

Quantum computing poses a long-term threat to Bitcoin's security through elliptic curve cryptography, but developers are actively building protective solutions before the technology becomes viable.
Cryptocurrency
fromCointelegraph
1 month ago

Bitcoin's Quantum Defense Plan: What BIP-360 Actually Changes

BIP-360 formally adds quantum resistance to Bitcoin's roadmap through Pay-to-Merkle-Root, reducing elliptic curve exposure by eliminating Taproot key path spending while preserving smart contract flexibility.
Science
fromPadailypost
2 months ago

Arthur H. Hausman

Arthur Herbert Hausman (1923–2026) was a cryptologist, engineer, and executive whose innovations in cryptography, electronics, and broadcasting advanced national security and global media.
Information security
fromTheregister
2 months ago

How the GNU C Compiler became the Clippy of cryptography

Modern compilers optimize away security protections, causing constant-time and other defensive code to fail and reintroducing side-channel vulnerabilities.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

AES-256-GCM strong encryption provides robust, reliable protection for sensitive personal data as a last line of defense against modern cyber threats.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, is essential as the last line of defense to protect sensitive personal data against modern cyber threats.
fromwww.bbc.com
4 months ago

Cryptology firm cancels elections after losing encryption key

The International Association for Cryptologic Research (IACR) uses an electronic voting system which needs three members, each with part of an encrypted key, to access the results. In a statement, the scientific organisation said one of the trustees had lost their key in "an honest but unfortunate human mistake", making it impossible for them to decrypt - and uncover - the final results.
Information security
Information security
fromArs Technica
4 months ago

Cryptography group cancels election results after official loses secret key

A lost trustee private key prevented decryption of IACR’s Helios-election ballots, causing results cancellation and prompting a re-run with revised key-sharing rules.
#kryptos
fromWIRED
5 months ago

Inside the Multimillion-Dollar Plan to Make Mobile Voting Happen

Joe Kiniry, a security expert specializing in elections, was attending an annual conference on voting technology in Washington, DC, when a woman approached him with an unusual offer. She said she represented a wealthy client interested in funding voting systems that would encourage bigger turnouts. Did he have any ideas? "I told her you should stay away from internet voting, because it's really, really hard," he says.
US politics
fromInfoWorld
5 months ago

Microsoft's .NET 10 arrives with AI, runtime, and language improvements

For cryptography, .NET 10 introduces extensive new APIs across cryptography, globalization, numerics, serialization, collections, and diagnostics. Also, with quantum computing on the horizon, .NET 10 expands post-quantum cryptography support with Windows Cryptography API: Next Generation (CNG) support, enhanced ML-DSA with simplified APIs, and HashML-DSA support, plus Composite ML-DSA for hybrid approaches. Additional cryptography enhancements include AES KeyWrap with Padding support for secure key wrapping scenarios.
Information security
#privacy
fromenglish.elpais.com
7 months ago

The spies of the pharaohs and the double agents of the Caesars: How intelligence services operated in antiquity

It may sound anachronistic to use terms like espionage, counterintelligence, secret services, or double agents in relation to ancient times. But activities, organizations, and personnel that largely fit our current concepts were widely deployed by the civilizations of the ancient world, giving truth to the saying that there is nothing new under the Sun (or, in this case, the shadows). To provide a few examples: Ramses II was nearly defeated at the Battle of Kadesh (which ended in a stalemate)
History
fromGSMArena.com
8 months ago

UK drops its request for encrypted iCloud data backdoor

Over six months after these events, U.S. Director of National Intelligence Tulsi Gabbard confirmed that the UK has withdrawn its requests following months of talks between the two governments.
Privacy technologies
fromHackernoon
2 years ago

Cryptography's Developer Dilemma: An Urgent Call for API Research | HackerNoon

We clustered 91,954 cryptography-related questions on Stack Overflow and manually analyzed 383 to comprehend the crypto challenges developers face. Developers showed a lack of knowledge of fundamental concepts.
Cryptocurrency
fromTheregister
8 months ago

The EFF turns 35, but there's plenty more to do

The organization has since been prominent in some of the most important legal battles for privacy, online operations, and legislative correction.
Privacy professionals
Cryptocurrency
fromInfoWorld
9 months ago

Bringing post-quantum cryptography to Windows

Post-quantum cryptography addresses vulnerabilities of conventional and quantum computing, focusing on securing valuable information.
#blockchain
fromHackernoon
2 years ago
Cryptocurrency

Zama Raises $57M In Series B To Bring End-to-End Encryption To Public Blockchains | HackerNoon

fromHackernoon
2 years ago
Privacy technologies

Zero-Knowledge, Zero Limits: The Vision Behind Aleo's New Blockchain Paradigm | HackerNoon

fromHackernoon
2 years ago
Cryptocurrency

Zama Raises $57M In Series B To Bring End-to-End Encryption To Public Blockchains | HackerNoon

fromHackernoon
2 years ago
Privacy technologies

Zero-Knowledge, Zero Limits: The Vision Behind Aleo's New Blockchain Paradigm | HackerNoon

Privacy technologies
fromHackernoon
10 months ago

Cutting Private Key Backup Failures by 6 Orders of Magnitude | HackerNoon

The proposed backup methods provide enhanced security and reliability for private key recovery.
Trustees have only permission, while the owner retains possession, improving overall security.
Cryptocurrency
fromTechzine Global
10 months ago

Windows 11 will feature cryptography that can withstand quantum computers

Windows 11 now incorporates support for post-quantum cryptography to secure data against future quantum computing threats.
fromInfoQ
11 months ago

OpenJDK News Roundup: Key Derivation, Scoped Values, Compact Headers, JFR Method Timing & Tracing

JEP 510 proposes the finalization of the Key Derivation Function API after one round of preview, enhancing cryptographic capabilities in Java.
Java
Scala
fromHackernoon
1 year ago

Go 1.22: Bringing Math/rand and Crypto/rand together | HackerNoon

Go 1.22 enhances random number generation by integrating cryptographic sources into the math/rand package, improving randomness and mitigating misuse risks.
fromComputerWeekly.com
11 months ago

Preparing for post quantum computing will be more difficult than the millenium bug | Computer Weekly

The transformation needed for organisations in the UK to be ready for the threat of post-quantum computing will make preparations for the millennium bug look easy, cyber chiefs said today.
Information security
Privacy professionals
fromNextgov.com
11 months ago

Signal clone used by Waltz to archive messages suspends services after reported hack

TeleMessage suspended its services after a hacker breached internal materials, including sensitive information related to U.S. Customs and Border Protection.
Information security
fromTechiediaries
11 months ago

Generate and Crack Passwords with Python and Ethical Considerations

Python's secrets module offers secure password generation by utilizing cryptographically strong random number generators.
Following best practices in password creation significantly enhances security against unauthorized access.
fromInfoWorld
11 months ago

Oracle releases FIPS-validated crypto module for Java

Oracle's Jipher introduces a FIPS-140 validated OpenSSL module for Java developers, enhancing security within the standard Java Cryptography Architecture framework.
Java
Java
fromOracle
11 months ago

Jipher: Java Cryptographic Service Provider for FIPS Environments

Oracle Jipher enables Java applications to meet FIPS 140-2 requirements with a validated cryptographic module.
London startup
fromHackernoon
2 years ago

Why Lattica's $3.25M Bet on Fully Homomorphic Encryption Could Change AI Privacy Forever | HackerNoon

Lattica's technology enables AI to process data privately using Fully Homomorphic Encryption, addressing major privacy concerns.
Cryptocurrency
fromHackernoon
2 years ago

The HackerNoon Newsletter: xAI's Grok 3: All the GPUs, None of the Breakthroughs (4/17/2025) | HackerNoon

Elon Musk's Grok 3 is touted as the world's best AI, sparking comparisons with competitors like GPT-4o and Claude 3.7.
OMG science
fromwww.scientificamerican.com
1 year ago

Alan Turing's Lost Work Could Reveal How Tigers Got Their Stripes

Alan Turing's contributions to mathematics and biology reveal the interconnectedness of his work in cryptography, computing, and pattern formation.
NYC startup
fromSilicon Canals
1 year ago

Amsterdam's Invest-NL takes priority stake in Fox Crypto following NCC Group divestment: Know more - Silicon Canals

Invest-NL has acquired a stake in Fox Crypto to enhance the Netherlands' cryptographic capabilities at the request of various Dutch ministries.
[ Load more ]