Search Results for "cryptography"
Ethereum's Progress and Innovations Spotlighted at Devcon SEA 2024
Devcon SEA 2024 in Bangkok highlighted Ethereum's advancements, focusing on real-world applications, scaling, and second-generation cryptography, while fostering community collaboration.
Quantum Computing's Potential Impact on Bitcoin (BTC) Security
Exploring the potential implications of quantum computing on Bitcoin's security and the feasible countermeasures to safeguard against future threats.
a16z Crypto Unveils Twist and Shout for Enhanced zkVM Performance
a16z Crypto introduces Twist and Shout, innovative memory-checking arguments designed to improve zkVM performance by ensuring accurate handling of memory operations.
Sui Blockchain Prepares for Quantum Computing Challenges
Sui blockchain is enhancing its cryptographic systems to tackle the looming threat of quantum computing, ensuring long-term data security and integrity.
Highlights from Real World Crypto 2025 Conference: SNARKs, Digital Euros, and AI Agents
The Real World Crypto 2025 conference in Sofia, Bulgaria, showcased developments in cryptography, including SNARKs, digital identity, and the Digital Euro project.
Besu's BN254 Vulnerability: Subgroup Check Flaw Exposes Security Risks
A critical vulnerability in Besu's Ethereum client related to subgroup checks on BN254 curve has been addressed. This flaw could have potentially compromised cryptographic security.
Decentralization and AI: Exploring the Trust Layer in Emerging Technologies
The convergence of decentralization and AI is creating new opportunities and challenges in technology, focusing on trust and privacy issues, as discussed by industry leaders from various tech networks.
Sui Unveils Passkey for Effortless Web3 Onboarding
Sui introduces a passkey system enabling users to access Web3 apps using biometric authentication, simplifying the onboarding process while maintaining security.
Enhancing Data Security with cuPQC 0.4's Advanced Hash Functions and Merkle Trees
NVIDIA's cuPQC 0.4 introduces advanced cryptographic features like expanded hash functions and Merkle trees, bolstering data integrity and security for large datasets.
Exploring GKR: A Crucial Component in Accelerating Cryptographic Proofs
Gain insights into the GKR protocol, a key driver behind ultra-fast cryptographic proofs, and understand its application in proving Poseidon hashes and other computations.
DOJ Wants to Bypass End-to-End Encryption to Fight Child Sexual Exploitation – Cause for Concern for Tech?
US government officials want to bypass encryption on websites, under allegations that child sexual exploitation runs unmonitored on strongly encrypted platforms.
China Updates Smart City Infrastructure with Blockchain-Based City Identification System
China Updates Smart City Infrastructure with Blockchain-Based City Identification System