New chip can protect wireless biomedical devices from quantum attacks
Ultra-efficient chip design enables extremely strong cryptography algorithms to run on energy-constrained edge devices.
Ultra-efficient chip design enables extremely strong cryptography algorithms to run on energy-constrained edge devices.
Strahinja Janjusevic brings an international perspective and US Naval Academy education to his graduate research in the MIT Technology and Policy Program.
New research demonstrates how AI models can be tested to ensure they don’t cause harm by revealing anonymized patient health data.
The new certificate program will equip naval officers with skills needed to solve the military’s hardest problems.
The MIT Quantum Initiative is taking shape, leveraging quantum breakthroughs to drive the future of scientific and technological progress.
Optimized for generative AI, TX-GAIN is driving innovation in biodefense, materials discovery, cybersecurity, and other areas of research and development.
Now mandated by law, Lincoln Laboratory’s blackout drills are improving national security and ensuring mission readiness.
Lincoln Laboratory cybersecurity expert Hamed Okhravi calls for a unified approach to securing computer memory, as a matter of national security.
Chief information officer at Columbia University will join MIT in August.
The approach maintains an AI model’s accuracy while ensuring attackers can’t extract secret information.
New “Oreo” method from MIT CSAIL researchers removes footprints that reveal where code is stored before a hacker can see them.
MIT CSAIL Principal Research Scientist Una-May O’Reilly discusses how she develops agents that reveal AI models’ security weaknesses before hackers do.
The technique leverages quantum properties of light to guarantee security while preserving the accuracy of a deep-learning model.
Building on a landmark algorithm, researchers propose a way to make a smaller and more noise-tolerant quantum factoring circuit for cryptography.
AI agents could soon become indistinguishable from humans online. Could “personhood credentials” protect people against digital imposters?