A graduate student solved the problem of confirming quantum computing

Urmila Mahadev spent eight years in the master's program in search of an answer to one of the most basic questions of quantum computing: how do we know that the quantum computer did at least something at the quantum level?


 
A graduate student solved the problem of confirming quantum computing  
 
In the spring of 201? Urmila Mahadev was in a good position, in terms of the majority of graduate students. She has just solved the most important problem of quantum computing - the field of computer studies, deriving its capabilities from the strange laws of quantum physics. Together with her earlier works, Mahadev’s new result describing the so-called “Blind computation,” ...[/h]
+ 0 -

Ways to use the blockchain turned somewhere not there. Sony has announced the creation of a DRM system based on a

Ways to use the blockchain turned somewhere not there. Sony has announced the creation of a DRM system based on ablock chain. 3r3-31. When the blockchain just started its way "to the masses", evangelical technology told us that it brings only positive changes to the world. The clarity, immutability and transparency of the blockchain as a transactional platform presented the technical community an excellent opportunity to change the world for the better. However, as time went on, developers and companies began to more and more actively look for options for applying the chain of blocks. After bitcoin and the Altcoin boom, smart contracts for business and insurance appeared on the scene, private blockchains appeared that ...
+ 0 -

Validation of electronic signatures in C # using CRIPTO PRO

 3r33333. 3r3-31. Continuing the conversation on the topic of electronic signatures (hereinafter referred to as ED), it is necessary to say about verification. In the previous article I examined the more difficult part of the task - the creation of a signature. This article is somewhat simpler. Most of the code is an adaptation of examples from the CRYPTO PRO .NET SDK. First of all, we will check signatures according to GOST R ???-2001 and GOST R ???-201? for which we need the CRIPTO PRO. 3r33333.  3r33333.
3r33333.  3r33333. The task for us is divided into 3 parts: a separated signature, a signature ...
+ 0 -

Signing a PDF on JS and inserting a signature on C # using Krypto PRO

 3r33434. 3r3-31. So. The task came. Using a browser, invite the user to sign a PDF with an electronic signature (hereinafter referred to as ES) The user must have a token containing a certificate, public and private key. Next on the server you need to insert a signature in the PDF document. After that, you need to check the signature for validity. We use ASP.NET and C # as the back-end.
 3r33434.
 3r33434. All salt in that it is necessary to use the signature in the CAdES-X Long Type 1 format, and the Russian GOST R ???-200? GOST R ???-201? etc. In addition, there can be more than one signatures...
+ 0 -

Fascinating cryptography or research on the topic of reversible encryption in PHP

One of the main truths of cryptography is that you should not invent anything in this area if you are not a professional. This is partly true, because all the best has long been invented, suffered and used for more than a decade in the field of information technology. The other side of the truth is that the development of some area of ​​knowledge occurs only with a constant influx of fresh ideas and original solutions in it.
 
 
For obvious reasons, we will not attack the giants of industrial cryptography like AES, but plunge into our own cryptographic research with blackjack and jokes.
 
...
+ 0 -

Fintech digest: problems of biometrics on mobile, leasing of Samsung phones, securities on the

Fintech digest: problems of biometrics on mobile, leasing of Samsung phones, securities on theblockbuster.Today in the issue:   Biometrics on mobile devices is a difficult task; The Chinese bank issued securities on the block; Flagship devices from Samsung can be leased; Bitcoin is ready for rapid growth.       Smartphones and cryptographic protection - compatibility is still inadequate  Banks of Russia collect biometric data of citizens for three months already. But, as it turned out , the provision of personal services based on these data is still not possible for users. The problem is that the requirements for the level of cryptographic protection are high, and in some cases it is simply ...
+ 0 -

Smart Contracts Waves. The first experiment was

Smart Contracts Waves. The first experiment was
 
 
In April 201? the Waves team unveiled their non-Turing-complete smart contracts.
 
 
A little later, when the Waves hackathon was announced, I decided it was time to plunge into the new technology. Under the cut, you will find detailed information about the smart contract that won the third place on the hackathon.
 
 
The article will be useful for developers to implement their own smart contracts and get acquainted with
technology.  
library
? Node.js Waves), open
the source code is
on GitHub and demonstration of the project ...
+ 0 -

Cryptography after alien landing

The author of the article: Bruce Schneier is an American cryptographer, writer and computer security specialist. He is the author of several books on security, cryptography and information security. The founder of the cryptographic company Counterpane Internet Security, Inc., a member of the Board of Directors of the International Association of Cryptological Research and a member of the advisory board of the Electronic Privacy Information Center.
 
 
Cryptography after alien landing Quantum computing is a new way of making calculations that will allow humanity to perform calculations simply impossible with the use of modern computers. The ...
+ 0 -

Fintech Digest: personal data of Russian citizens, marketplace CB, new service from CloudFlare

+ 0 -

Tamers of Enigma: Mavis Bayty (Lever), Margaret Rock

Cryptography, cipher machines, agencies, espionage things and yet behind it all stood and are ordinary, but unusual people. Who they are and how their fate has developed, why and for what purpose did they devote their lives to the difficult business of "cryptography".
 
 

Mavis Batey is a fearless burglar of the code


 
Tamers of Enigma: Mavis Bayty (Lever), Margaret Rock  
The whole truth about VPS (KVM) E5-2650 v4 (6 Cores) 10GB DDR???GB SSD 1Gbps from $ 20 or how to divide the server correctly? (options are available with RAID1 and RAID1? up to 24 cores and up to 40GB DDR4).
 
 
VPS (KVM) E5-2650 v4 (6 Cores) 10GB DDR???GB SSD 1Gbps ...[/h]
+ 0 -