Innovation Toronto Innovation Toronto

.

Highlights from the race between genius and stupidity . . .

  • About Us
    • Privacy Policy
  • List of Institutions
  • Institution Updates
  • 1MM to 3MM Visitors
    • 2MM to 3MM Visitors
    • 1MM to 2MM Visits
  • 100k to 1MM Visitors
    • 500k to 1MM Visitors
    • 300k to 500k Visitors
    • 200k to 300k Visits
    • 100k to 200k Visits
  • Up to 100k Visitors
    • 50k to 100k Visits
    • 25K to 50K Visits
    • 10k to 25k Visits
    • Under 10k Visits
Menu
  • About Us
    • Privacy Policy
  • List of Institutions
  • Institution Updates
  • 1MM to 3MM Visitors
    • 2MM to 3MM Visitors
    • 1MM to 2MM Visits
  • 100k to 1MM Visitors
    • 500k to 1MM Visitors
    • 300k to 500k Visitors
    • 200k to 300k Visits
    • 100k to 200k Visits
  • Up to 100k Visitors
    • 50k to 100k Visits
    • 25K to 50K Visits
    • 10k to 25k Visits
    • Under 10k Visits
loading...
The Latest
  • New ultra-thin optical coatings could dramatically extend the life of solar panels by 6 times
  • New desalination approach makes it is possible for water, produced by sunlight, to be even cheaper than tap water
  • Achieving passive cooling inside naturally conditioned buildings in hot arid climates
  • Generating power from salt water at seawater-freshwater boundaries
  • Getting RNA for the first time from extinct species like the Tasmanian Tiger increases resurrection chances
  • Discovering the intention of a person using just brain wave data
  • Removing microplastics from water with fungus
  • DNA movable-type storage represents a major step forward in the field of data storage
  • Ultrasound can change brain functions for up to an hour
  • Two years’ worth of net global carbon emissions could be saved by upgrading iron and steel plants
Home Cryptography

Real cybersecurity using only a single quantum bit gets real

Real cybersecurity using only a single quantum bit gets real

Read more

Share 0
Tweet
Share
Share

New methods of distributing secret cryptographic keys for secure communication and protecting private information

New methods of distributing secret cryptographic keys for secure communication and protecting private information

Read more

Share 0
Tweet
Share
Share

New single sign-on system cryptographic scheme completely hides your personal information

New single sign-on system cryptographic scheme completely hides your personal information

Read more

Share 0
Tweet
Share
Share

Tiny battery-free ID chip can authenticate nearly any product and save billions

Tiny battery-free ID chip can authenticate nearly any product and save billions

Read more

Share 0
Tweet
Share
Share

Large numbers of quantum light sources on a chip could mean unbreakable cryptographic systems and quantum computers

Large numbers of quantum light sources on a chip could mean unbreakable cryptographic systems and quantum computers

Household lightbulbs give off a chaotic torrent of energy, as trillions of miniscule light particles – called photons – reflect and scatter in all directions. Quantum light sources, on the o... Read more

Share 0
Tweet
Share
Share

PPPL and Princeton demonstrate novel technique that may have applicability to future nuclear disarmament agreements

PPPL and Princeton demonstrate novel technique that may have applicability to future nuclear disarmament agreements

A system that can compare physical objects while potentially protecting sensitive information about the objects themselves has been demonstrated experimentally at the U.S. Department of Ener... Read more

Share 0
Tweet
Share
Share

Collecting digital user data without invading privacy

Collecting digital user data without invading privacy

311111 novel cryptographic method that makes it possible to collect data and protect the privacy of the user at the same time The statistical evaluation of digital user data is of vital impo... Read more

Share 0
Tweet
Share
Share

Cryptography Breakthrough Could Make Software Unhackable

Cryptography Breakthrough Could Make Software Unhackable

Researchers are hailing the new work as a watershed moment for cryptography As a graduate student at the Massachusetts Institute of Technology in 1996, Amit Sahai was fascinated by the stran... Read more

Share 0
Tweet
Share
Share

Assuring the Integrity of Voting Using Cryptography

Assuring the Integrity of Voting Using Cryptography

American voters have no way of knowing that our votes have been counted, or counted correctly. We go to the polls and we punch buttons on a screen or fill out paper ballots and put them in a... Read more

Share 0
Tweet
Share
Share

Unbreakable cryptography: The devil and the details

Unbreakable cryptography: The devil and the details

Quantum cryptography has yet to deliver a truly unbreakable way of sending messages. Quantum entanglement may change that RECENT revelations of online snooping on an epic scale, by governmen... Read more

Share 0
Tweet
Share
Share

Breakthrough in cryptography could result in more secure computing

Breakthrough in cryptography could result in more secure computing

Could result in a sea change in how to secure computations New research to be presented at the 18th European Symposium on Research in Computer Security (ESORICS 2013) this week could result... Read more

Share 0
Tweet
Share
Share

Most Visited Today

Most Visited This Week

Most Visited This Month

Most Visited This Year

Featured Today . . .

New ultra-thin optical coatings could dramatically extend the life of solar panels by 6 times

Read More
on 29 September 2023

New desalination approach makes it is possible for water, produced by sunlight, to be even cheaper than tap water

Read More
on 28 September 2023

Achieving passive cooling inside naturally conditioned buildings in hot arid climates

Read More
on 27 September 2023

Generating power from salt water at seawater-freshwater boundaries

Read More
on 26 September 2023
load more
The Latest University & Research Institutions Updated . . .

University of Rochester

University of Arizona (U of A)

Peking University (PKU)

Massachusetts Institute of Technology (MIT)

Radboud University Nijmegen

Case Western Reserve University

Shanghai Jiao Tong University (SJTU)

Princeton University

University of California Los Angeles (UCLA)

Texas A&M AgriLife Research

University of Illinois at Urbana Champaign (UIUC)

Tianjin University

load more

Copyright 2023. Created by Innovation Toronto

Desktop Version Mobile Version