Most organizations don’t know what cryptographic assets they have, where they’re being used, or how strong (or weak) they are ...
A new, hidden vulnerability in the gnuTLS software threatens open-source security in a fundamental way -- even more than Apple's GoTo Fail bug of last week. Share on Facebook (opens in a new window) ...
After installing the update previews from late September or the security updates from October in Windows, some unexpected ...
The shift to post-quantum encryption is on track to become a business and compliance obligation in coming years, regardless ...
Card-based cryptographic protocols employ physical playing cards to facilitate secure multiparty computations without the need for electronic devices. These protocols allow participants to perform ...
SUNNYVALE, Calif.--(BUSINESS WIRE)-- NTT Research, Inc., a division of NTT (TYO:9432), today announced 11 papers co-authored by members of its Cryptography & Information Security (CIS) Lab and one ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results