Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged schneier

Rss Feed Group items tagged

Derek Bruff

NSA Plans for a Post-Quantum World - Schneier on Security - 0 views

  •  
    Here's a recent piece by security expert Bruce Schneier on quantum computing, which is different than quantum cryptography. (I conflated the two during class today.) Quantum computing is very fast computing that could be used to quickly break modern encryption schemes. Quantum cryptography involves sending messages that can't be read, since "looking" at them changes the message. Schneier offers some conjectures about where the NSA is with regard to both technologies.
Derek Bruff

Another Salvo in the Second Crypto War (of Words) - Schneier on Security - 0 views

  •  
    And here's Bruce Schneier on that story about Apple's encryption policies thwarting justice. If you read the first piece, you should also read this one.
saraatsai

Schneier on Security - 2 views

  •  
    This is a blog by Bruce Schneier who writes about security in general, under which cryptography falls as a subject.
Derek Bruff

On the Equifax Data Breach - Schneier on Security - 1 views

  •  
    Bruce Schneier on the Equifax hack
Allison Molo

Shadow analysis could spot terrorists by their walk - tech - 04 September 2008 - New Sc... - 1 views

  •  
    Just like in Little Brother! Schneiner responds to this article here: https://www.schneier.com/blog/archives/2008/09/gait_analysis_f.html
parker718

Schneier on Security - 1 views

  •  
    A well-reasoned argument from our favorite security blogger, with plenty of links to help us in writing our final paper. It is also an interesting article as it talks about the debate before Snowden, Wikileaks, and other whistleblowers.
Derek Bruff

Securing Medical Research: A Cybersecurity Point of View (Bruce Schneier) - 0 views

  •  
    "The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work. "
junqing-shi

NSA surveillance: A guide to staying secure - 3 views

  •  
    Some advice from security expert Bruce Schneier on how to keep the NSA from snooping on you. "Trust the math. Encryption if your friend."
Derek Bruff

Cotton squares off against Apple CEO | TheHill - 0 views

  •  
    Apple CEO Tim Cook was on 60 Minutes yesterday, reiterating his company's support for strong encryption. Today, Senator Tom Cotton called on Apple and other companies to install "back doors" for law enforcement agencies. I wonder if Tom Cotton has read the "Keys Under Doormats" report by Schneier, Rivest, Diffie, et al.
mmukhin

Bruce Schneier (@schneierblog) | Twitter - 0 views

  •  
    "@schneierblog"
  •  
    @schneierblog was already on my Twitter list. Can you track down someone else to add?
  •  
    Good pick, but this account is already on the Twitter list. Can you make another suggestion?
Derek Bruff

When it comes to internet privacy, be very afraid, analyst suggests | Harvard Gazette - 2 views

  •  
    Here's a recent interview with security expert Bruce Schneier.
1 - 20 of 20
Showing 20 items per page