Thwarting the cleverest attackers
Savvy hackers can steal a computer’s secrets by timing its data storage transactions or measuring its power use. New research shows how to stop them.
Savvy hackers can steal a computer’s secrets by timing its data storage transactions or measuring its power use. New research shows how to stop them.
A new twist on pioneering work done by MIT cryptographers almost 30 years ago could lead to better ways of structuring contracts.
A switch that lets one photon alter the quantum state of another could point the way to both practical quantum computers and a quantum Internet.
How a handful of countercultural scientists changed the course of physics in the 1970s and helped open up the frontier of quantum information.
A new system would jam wireless signals sent to medical implants by unauthorized users.
Public-key system has worked and made Internet commerce feasible, but new systems are ready in case flaws are found.
A new system for ensuring accurate election tallies, which MIT researchers helped to develop, passed its first real-world test last Tuesday.
Even well-defended computers can leak shocking amounts of private data. MIT researchers seek out exotic attacks in order to shut them down