IDEMIA, a major provider of forensic and other tools for law enforcement, has put out new cloud-based fingerprint matching software in the hopes that it can enable smaller local agencies to start ...
Passwords are crap. Nobody picks good ones, when they do they re-use them across sites, and if you use even a trustworthy password manager, they’ll get hacked too. But you know what’s worse than a ...
Three cryptographers at Stanford University recently came up with a clever solution to the persistent problem of identity theft on the Internet. Wily hackers in Russia, China, and other countries send ...
An algorithm that transforms a given amount of data (the "message") into a fixed number of digits, known as the "hash," "digest" or "digital fingerprint." Hash functions are a fundamental component in ...
NIST is planning a competition to develop one or more cryptographic 'hash' algorithms to augment and revise the current Secure Hash Standard (Federal Information Processing Standard 180-2). The ...
If you haven’t heard, Apple unveiled two new iterations of the iPhone at one of the Cupertino company’s typically grandiose product events yesterday. As usual, there was plenty of hype to go around, ...
The National Institute of Standards and Technology (NIST) is planning a competition to develop one or more cryptographic "hash" algorithms to augment and revise the current Secure Hash Standard ...