‘Physically unclonable function’ is 10 times more reliable than previous methods Rice University integrated circuit (IC) designers are at Silicon Valley’s premier chip-design confe... Read more
Special-purpose chip reduces power consumption of public-key encryption by 99.75 percent, increases speed 500-fold. Most sensitive web transactions are protected by public-key cryp... Read more
Action is needed to monitor and control the emerging Internet of Toys, concludes a new JRC report. Privacy and security are highlighted as main areas of concern. Large numbers of c... Read more
A typical office scanner can be infiltrated and a company’s network compromised using different light sources, according to a new paper by researchers from Ben-Gurion University of... Read more
When surveillance cameras began popping up in the 1970s and ’80s, they were welcomed as a crime-fighting tool, then as a way to monitor traffic congestion, factory floors and even... Read more
Researchers at Tohoku University and NEC Corporation have discovered a new technique for compressing the computations of encryption and decryption operations known as Galois field... Read more
Human voices are individually recognizable because they’re generated by the unique components of each person’s voice box, pharynx, esophagus and other physical structures. Research... Read more
With an ever increasing number of everyday objects from our homes, workplaces and even from our wardrobes, getting connected to the Internet, known as the ‘Internet of Things... Read more
In the nascent “internet of things”, security is the last thing on people’s minds BARBIE has come a long way since Mattel, a big American toy firm, launched the plastic doll in 195... Read more
Federal Trade Commission on Tuesday confirmed some of the worst fears about Internet-connected devices, saying the technology presented serious data security and privacy risks, and... Read more
The tool leverages this technology to detect security-specific properties within a hardware system. For example, the tool can make sure that a cryptographic key does not leak outsi... Read more