# Category Cryptology

## Cryptography for the Post-Quantum World

There’s a good story about Nasreddin who lived some 1000 years ago. Nasreddin Hodja: I promised the Emir (King) of Bukhara that I will teach his donkey to speak like a human being, in 15 years time. He gave me lots of money for it. Friend: Are you crazy? You cannot do it. The Emir […]

## Limits of the Efficiently Computable

Two interesting and related talks, one on the physical limitations of computational power and the other on cryptography and computational puzzles presented to us by Nature herself. Quantum Computing and the Limits of the Efficiently Computable Breaking Codes and Finding Patterns Quantum Computing and the Limits of the Efficiently Computable Talk by Scott Aaronson, 2011 […]

## Cryptology, cryptography, and cryptanalysis

Reprinted from Military Embedded Systemsby Ray Alderman, VITA Standards Organization Cryptography is a broad, sticky, and mathematically complex, but interesting subject and an integral part of the evolution of warfare. So let’s get some definitions out of the way first. Cryptology is the study of codes, both creating and solving them. Cryptography is the art […]

## Academics advise how to keep data secure in a cyber-world

Cyber security experts from the University of Bristol have advised the European Union Agency for Network and Information Security (ENISA) on how to protect the personal data of millions of citizens. Two reports, edited by Professor Nigel Smart, Professor of Cryptology, have been published by ENISA. The Algorithms, key size and parameters report 2014 is […]

## Cryptography Primer Sessions

These are sessions at Microsoft Research by Josh Benaloh. Material is very technical and advanced. Enjoy! Josh Benaloh is a Cryptographer in Microsoft Research Verifiable Voting Links and Resources Benaloh cryptosystem Symmetric Primitives Integral Asymmetric Functions Primes, Elliptic Curves, & Lattices Attacks, Vulnerabilities, & Practical Considerations Tools and Applications Symmetric Primitives http://research.microsoft.com/apps/video/default.aspx?id=212617 Explores symmetric ciphers, […]

## Information that deserves attention, 5

These are the articles and videos from the previous week I found most interesting. Runaway Glaciers in West Antarctica What Is Vertigo? Free is a Lie Atomic Legos: Building and Investigating Quantum Materials One Atom at a Time Solve for X – A recap of our 2014 event; Google’s moonshot projects MMS Mission’s Unique Orbit […]

## How to influence others more effectively

These are the articles and videos from the previous week I found most interesting. Michio Kaku on Reading Minds, Recording Dreams, and Brain Imaging Are athletes really getting faster, better, stronger? Cryptography Primer ASIMO and Beyond: The history of Honda’s robotics program Get your next eye exam on a smartphone How to create nanowires only […]

## Information that deserves attention, 2

These are the articles and videos from the previous week I found most interesting. Cryptography Primer Josh Benaloh Session 2 – Symmetric Primitives This will be the second of six cryptography primer sessions exploring the basics of modern cryptography. In this session, we’ll explore symmetric ciphers, primitives, and protocols – including AES, cipher modes, hash […]