FEATURED SECURITY/CRYPTOGRAPHY

AI Boosts Security with Layered Learning Multiple Encryption Layers Increase Data Protection

Scientists tested how secure it is to use multiple layers of encryption, specifically looking at a type of data called "double DES" and "triple DES". Their findings show that using extra layers can actually make the data more difficult to break, which could lead to better protection for sensitive information.

Read Full Paper →

AI Learns from Data to Better Understand Your Habits

We created a new language called LaSCO that helps organizations define their security policies in a clear and formal way. This can lead to better protection against cyber threats by making it easier for computers to automatically enforce these policies and detect any potential issues, giving organizations more control over how their systems interact with each other.

Read Paper →

AI Gets Smarter with Secure Data Sharing Breakthrough

Scientists developed a new way for multiple parties to securely share information without being compromised by an adversary. This breakthrough could have significant implications for protecting sensitive data in various fields, allowing people to trust that their information is kept confidential even when shared among many individuals or groups.

Read Paper →
a cup of coffee on a white table

AI Learns Your Habits by Mastering Data Patterns

Scientists created educational materials that explain how a specific computer algorithm works, using mathematical concepts called modular arithmetic. These explanations can help students learn about this important technique and its applications, which could lead to new discoveries and advancements in fields like cryptography.

Read Paper →

AI Learns Your Online Habits

Scientists created a mathematical model to test a new way to keep internet communications safe from tampering or eavesdropping. This model could help students and others understand how secure online connections work, which is important for protecting sensitive information exchanged over the internet.

Read Paper →