Category Cryptology

Cryptology, cryptography, and cryptanalysis

Reprinted from Military Embedded Systemsby Ray Alderman, VITA Standards Organization Cryptography is a broad, sticky, and mathematically complex, but interesting subject and an integral part of the evolution of warfare. So let’s get some definitions out of the way first. Cryptology is the study of codes, both creating and solving them. Cryptography is the art […]

Academics advise how to keep data secure in a cyber-world

Cyber security experts from the University of Bristol have advised the European Union Agency for Network and Information Security (ENISA) on how to protect the personal data of millions of citizens. Two reports, edited by Professor Nigel Smart, Professor of Cryptology, have been published by ENISA. The Algorithms, key size and parameters report 2014 is […]

Cryptography Primer Sessions

These are sessions at Microsoft Research by Josh Benaloh. Material is very technical and advanced. Enjoy! Josh Benaloh is a Cryptographer in Microsoft Research Verifiable Voting Links and Resources Benaloh cryptosystem Symmetric Primitives Integral Asymmetric Functions Primes, Elliptic Curves, & Lattices Attacks, Vulnerabilities, & Practical Considerations Tools and Applications Symmetric Primitives Explores symmetric ciphers, […]

Information that deserves attention, 5

These are the articles and videos from the previous week I found most interesting. Runaway Glaciers in West Antarctica What Is Vertigo? Free is a Lie Atomic Legos: Building and Investigating Quantum Materials One Atom at a Time Solve for X – A recap of our 2014 event; Google’s moonshot projects MMS Mission’s Unique Orbit […]

Information that deserves attention, 3

These are the articles and videos from the previous week I found most interesting. Michio Kaku on Reading Minds, Recording Dreams, and Brain Imaging Are athletes really getting faster, better, stronger? Cryptography Primer ASIMO and Beyond: The history of Honda’s robotics program Get your next eye exam on a smartphone How to create nanowires only […]

Information that deserves attention, 2

These are the articles and videos from the previous week I found most interesting. Cryptography Primer Josh Benaloh Session 2 – Symmetric Primitives This will be the second of six cryptography primer sessions exploring the basics of modern cryptography. In this session, we’ll explore symmetric ciphers, primitives, and protocols – including AES, cipher modes, hash […]