Skip to main content

Home/ Groups/ Math 1111: Cryptography
Justin Yeh

Getting Slower And Slower: How Slow Can You Go? : Krulwich Wonders... : NPR - 0 views

  •  
    Speed is generally considered exciting, but this blog post takes a different approach. It uses interesting examples, both foreign and familiar, to create a relative scale of speed. It is extremely easy to understand and informative. 
Marco Tiburcio

Robots: Can biohybrid model sink or swim? - 0 views

  •  
    This article describes an ongoing project to build an artificial organism that integrates biological parts with electrical components. The article, while introducing scientific jargon, does a great job of explaining technical terms in depth. It also quotes members of the project team, presenting a realistic assessment of the project's progress and odds of success. Lastly, the article includes several links to videos and pages of extremely interesting and relevant content.
Kristin Davis

BBC - Future-Intelligence agencies turn to crowdsourcing - 0 views

  •  
    This article on how the CIA is using crowdsourcing to make intelligence more accurate is particularly well written because if its inclusion of a quick attention draw with the reference to the new James Bond movie, good historical background, an inviting writing style that includes rhetorical questions, and interviews with experts that add to the legitimacy of the article. 
Collin Jackson

Cell Phone Data Could Help Clip Malaria Spread - 0 views

  •  
    Using data from cellphone locations in Kenya, analysts are better able to predict how malaria will spread.
Tyren Herbst-Ingram

Come Firewalk With Me - 0 views

  •  
    The article makes a clear argument with supporting facts, all while being easily accessible to people that are unfamiliar with the field and remaining entertaining
Collin Jackson

Cipher Solver - 0 views

  •  
    Here is the tool I used that puts the plain text letters over the cipher letters.
Ryan McLaughlin

Britain's GCHQ Uses Online Puzzle to Recruit Hackers - NYTimes.com - 0 views

  •  
    Instead of hiring "upper-class twits from Oxford and Cambridge," A government communications agency tried a new angle on recruiting hackers. They decided to combat hackers with other experienced hackers by posting an online puzzle and offering a job interview to those who solved it.
sareennl

Tools boast easy cracking of Microsoft crypto for businesses - 0 views

  •  
    Summary: Cryptography specialists have developed tools to crack PPTP encryption (based on an algorithm from Microsoft), gaining access to Wi-Fi, passwords, corporate networks and data.
Marco Tiburcio

Step 1: Post Elusive Proof. Step 2: Watch Fireworks. - 0 views

  •  
    Online collaboration over the claimed proof "P versus NP" demonstrates the potential of the internet in the field of mathematical and intellectual research alike. The proof "P versus NP," if verified, would make obsolete modern cryptography, which works under the assumption that P does not equal NP.
Hannah Lee

Eastern European Cybercriminals Said to Trump Asian Counterparts in Sophistication CIO.com - 0 views

  •  
    Eastern European hackers have been proven more effective at their craft than Asian cybercriminals due to their precision, focus, and ability to protect their identities. 
Emily Dinino

New security flaws detected in mobile devices - USATODAY.com - 0 views

  •  
    Mobile devices offer incredibly low security or protection from criminals trying to decipher data. 
Siegfried Schlunk

Quantum processor's prime feat raises security issues | ZDNet - 0 views

  •  
    Summary: California researchers report a breakthrough with the creation of a solid-state quantum processor that could ultimately have a bearing on future cryptographic techniques. Researchers in California have designed and built a quantum processor capable of factoring 15 into its primes - with major implications for computer security.
Kristin Davis

UK recruits code-breakers with online puzzle - CNN - 0 views

  •  
    The Government Communications Headquarters in the UK offered a job application to anyone who could solve their code found at www.canyoucrackit.co.uk
Collin Jackson

The Fastest-Ever Random Number Generator Conjures Digits from Subatomic Noise in a Vacuum - 0 views

  •  
    Not directly involving cryptography, but the implications of this definitely affect the field. Now that we have the capability to generate truly random number strings, our ability to encrypt data will improve.
Justin Yeh

Cisco Releases Cloud IPS, Upgrades Security Products - 0 views

  •  
    An article about a Cisco security upgrade for the cloud and various devices that access the cloud.
Annie Vreeland

How 18th-Century Copiale Cipher Was Cracked - 0 views

  •  
    A description of how the Copiale Cipher was cracked. 
Malak Elmousallamy

Hacked Chamber of Commerce Opposed Cybersecurity Law - 0 views

  •  
    This is another example of the debate on whether security or privacy is more important.
« First ‹ Previous 741 - 760 of 791 Next › Last »
Showing 20 items per page