The blockchain technology is a game changer to enhance the security of our supply chain, and smart manufacturing. The technology enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered, and when combined with digital signatures, verifies the identity of the participants with its
Dr. Bertrand Cambou, a full tenured Professor at Northern Arizona University (NAU), is teaching graduate classes in nanoelectronics, cryptography, and cybersecurity. He is the Principal Investigator (PI) of research programs funded by the Air Force Research Laboratory (AFRL), and the Navy in ternary cryptography, the use of nanotechnologies for
Figuring out where and how Artificial Intelligence (AI) and its various sub-types (Machine Learning, Deep Learning, etc.) fit into our world as we move into the future is difficult. In some cases it seems straightforward; AI/ML speech recognition is astoundingly good and can be applied across many domains in a meaningful way. Mostly successful
Abstract: In recent years, there has been a substantial amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems
Crypto 2017 is the 37th International Cryptology Conference. It will be held at the University of California, Santa Barbara (UCSB) August 20-24 2017. The academic program covers all aspects of cryptology. The conference is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Computer Science Department of UCSB.
Biometrics is the “something you are” identity factor used in authentication and identification systems. Organizations that rely on biometric technology should ensure the confidentiality, integrity and authenticity of their biometric assets. To manage security risk, biometric information should be protected from unauthorized access and modification. * The
NIST-approved cryptographic standards were designed to perform well on general-purpose computers. In recent years, there has been increased deployment of small computing devices that have limited resources with which to implement cryptography. When current NIST-approved algorithms can be engineered to fit into the limited resources of constrained
The case for using a blockchain boils down to a concept in computer security known as “information integrity.”
The FBI and Apple could be heading for a new fight over access to a dead terrorist's iPhone.
This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third party that the signature was,