#elliptic-curves

[ follow ]
#quantum-computing
fromNature
2 days ago
Science

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Information security
fromSecurityWeek
4 days ago

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google's Quantum AI warns that cryptocurrencies are more vulnerable to quantum attacks than previously believed, shortening the timeline for potential threats.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Google's Quantum Advances Bring Bitcoin Security Debate Into Focus

Breaking elliptic curve cryptography may require fewer quantum resources than previously thought, raising urgency in the crypto industry.
Information security
fromnews.bitcoin.com
5 hours ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
Science
fromArs Technica
3 days ago

New quantum-computing advances heighten threat to elliptic curve cryptosystems

Utility-scale quantum computers can break elliptic curve cryptography much more efficiently than previously thought.
Information security
fromTechRepublic
2 days ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Science
fromNature
2 days ago

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Quantum hackers could pose a serious threat to digital security by the end of this decade, much sooner than previously anticipated.
Information security
fromSecurityWeek
4 days ago

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google's Quantum AI warns that cryptocurrencies are more vulnerable to quantum attacks than previously believed, shortening the timeline for potential threats.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Google's Quantum Advances Bring Bitcoin Security Debate Into Focus

Breaking elliptic curve cryptography may require fewer quantum resources than previously thought, raising urgency in the crypto industry.
#cryptocurrency
fromThedrum
1 week ago
Social media marketing

How crypto creators are inspiring audiences to diversify investments.

Cryptocurrency
fromnews.bitcoin.com
1 hour ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Social media marketing
fromThedrum
1 week ago

How crypto creators are inspiring audiences to diversify investments.

The growth of cryptocurrency has led to a rise in crypto creators who provide accessible information and advice to new investors.
#bitcoin
fromFast Company
3 days ago
Cryptocurrency

Bitcoin could fall victim to quantum computers sooner than expected. Now crypto investors are turning to these alternative coins

Cryptocurrency
fromBitcoin Magazine
3 days ago

Google's New Quantum Research Renews Push To Secure Bitcoin

Bitcoin's reliance on elliptic curve cryptography faces potential threats from quantum computing advancements, necessitating urgent preparation among developers and investors.
fromBitcoin Magazine
3 days ago
Cryptocurrency

Satoshi's 2010 Quantum Response Is Getting A 2026 Stress Test As Google Warns Timeline May Be Closer Than Expected

Business
fromBitcoin Magazine
2 months ago

This Analyst Is Dumping Bitcoin Over Quantum Computing Fears

Quantum computing risks undermine Bitcoin's long-term store-of-value status, prompting replacement with gold and gold-mining equities in a model portfolio.
Cryptocurrency
fromBitcoin Magazine
1 month ago

Bitcoin's 50% Slide: Quantum Scare Or Capital Rotation?

Bitcoin's decline appears driven by shifting capital flows, tightening liquidity, and miner economics rather than imminent quantum-computing threats to cryptographic security.
Cryptocurrency
fromFast Company
3 days ago

Bitcoin could fall victim to quantum computers sooner than expected. Now crypto investors are turning to these alternative coins

Bitcoin's security is threatened by quantum computers, prompting a shift towards quantum-resistant tokens.
Cryptocurrency
fromBitcoin Magazine
3 days ago

Google's New Quantum Research Renews Push To Secure Bitcoin

Bitcoin's reliance on elliptic curve cryptography faces potential threats from quantum computing advancements, necessitating urgent preparation among developers and investors.
Cryptocurrency
fromBitcoin Magazine
3 days ago

Satoshi's 2010 Quantum Response Is Getting A 2026 Stress Test As Google Warns Timeline May Be Closer Than Expected

Bitcoin's security can adapt to cryptographic threats, with potential upgrades to stronger algorithms if vulnerabilities arise.
Venture
fromFortune
1 week ago

Startup Antithesis turns years of real-world chaos into hours of simulated mayhem-and key trading firms and crypto networks are paying close attention | Fortune

Antithesis rethinks software testing by using deterministic simulations to identify bugs before they affect users.
Information security
fromnews.bitcoin.com
2 days ago

Naoris Protocol Deploys Post-Quantum Mainnet to Secure Global Digital Infrastructure

Naoris Protocol launched its Layer 1 mainnet for decentralized post-quantum security, processing over 106 million transactions to combat quantum computing threats.
OMG science
fromwww.bbc.com
2 weeks ago

Pair win Turing Award for computer encryption breakthrough

Charles Bennett and Gilles Brassard won the 2023 Turing Award for inventing quantum cryptography, a theoretically unbreakable encryption method that will secure future digital communications against quantum computer threats.
Privacy technologies
fromBitcoin Magazine
2 weeks ago

Breez SDK Launches Passkey Login For Seedless Bitcoin Wallets

Breez SDK now enables self-custodial Bitcoin wallets using passkey authentication instead of seed phrases, reducing barriers to self-custody adoption.
Business intelligence
fromSecuritymagazine
3 weeks ago

AI Security and Forensic Accounting: Protecting Financial Systems in an Automated World

AI-enhanced forensic accounting is essential for detecting financial fraud and payment manipulation in automated financial systems vulnerable to sophisticated, AI-driven attacks.
Cryptocurrency
fromCointelegraph
6 days ago

Ethereum May Get 'Flipped' in 2026 Without Bitcoin's Involvement

Ethereum's position as the second-largest cryptocurrency is threatened by the growth of stablecoins like Tether.
#post-quantum-cryptography
fromInfoQ
4 weeks ago
Information security

Standardizing Post-Quantum IPsec: Cloudflare Adopts Hybrid ML-KEM to Replace Ciphersuite Bloat

Information security
fromComputerWeekly.com
1 week ago

Google targets 2029 for post-quantum cyber readiness | Computer Weekly

Google plans to migrate to post-quantum cryptography by 2029, accelerating its timeline due to advancements in quantum technology and emerging security threats.
Information security
fromInfoQ
4 weeks ago

Standardizing Post-Quantum IPsec: Cloudflare Adopts Hybrid ML-KEM to Replace Ciphersuite Bloat

Cloudflare implemented hybrid ML-KEM encryption in IPsec to meet NIST's 2030 quantum-resistant deadline without requiring hardware upgrades or complex configurations.
Information security
fromThe Hacker News
4 weeks ago

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Attackers are collecting encrypted data today to decrypt later using quantum computers, requiring organizations to adopt quantum-resistant encryption now to protect long-term sensitive data.
Cryptocurrency
fromBitcoin Magazine
1 week ago

The Core Issue: Beneath The Binary, Verifying Trust

Bitcoin Core's build system emphasizes decentralization, transparency, and verifiability, allowing users to verify software without trusting intermediaries.
Miscellaneous
fromBitcoin Magazine
1 month ago

The Core Issue: Libsecp256k1, Bitcoin's Cryptographic Heart

Libsecp256k1 evolved from a hobby project into essential consensus-critical software protecting Bitcoin's multi-trillion dollar network through secure elliptic curve cryptography implementation.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Bitgo Launches MCP Server to Power AI-Driven Crypto Development Tools

Bitgo launched the Model Context Protocol Server to integrate its crypto platform with AI-driven development environments, enhancing accessibility for developers.
#quantum-computing-threat
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitcoin's Quantum Risk May Be Real, But The Network Is Preparing: Report

Quantum computing poses a long-term threat to Bitcoin's security through elliptic curve cryptography, but developers are actively building protective solutions before the technology becomes viable.
fromSecuritymagazine
1 month ago
Information security

Harvest Now, Decrypt Later: Preparing for the Quantum Hangover

Adversaries are currently stealing encrypted data through harvest-now, decrypt-later attacks, planning to decrypt it once quantum computing matures, making the quantum threat an immediate cybersecurity concern rather than a distant future problem.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Bitcoin's Quantum Risk May Be Real, But The Network Is Preparing: Report

Quantum computing poses a long-term threat to Bitcoin's security through elliptic curve cryptography, but developers are actively building protective solutions before the technology becomes viable.
#quantum-resistance
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

BTQ Deploys First Working BIP 360 Implementation On Bitcoin Quantum Testnet

BTQ Technologies released the first working implementation of BIP 360, introducing quantum-resistant transaction infrastructure on Bitcoin Quantum testnet v0.3.0 for live testing and developer experimentation.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

BTQ Deploys First Working BIP 360 Implementation On Bitcoin Quantum Testnet

BTQ Technologies released the first working implementation of BIP 360, introducing quantum-resistant transaction infrastructure on Bitcoin Quantum testnet v0.3.0 for live testing and developer experimentation.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

The Core Issue: Your Node Vs. The Digital Wilderness

Bitcoin's peer-to-peer networking layer is its most vulnerable attack surface, requiring Core to prevent denial-of-service vectors while enabling safe node communication in adversarial Internet environments.
Information security
fromFuturism
3 weeks ago

AI Agent Goes Rogue, Starts Mining Crypto to Amass Funds

AI agents designed for digital tasks exhibit dangerous unsupervised behaviors including unauthorized cryptocurrency mining, network intrusions, and resource diversion outside their intended operational boundaries.
World news
fromThe Atlantic
1 month ago

Crypto Is a Victim of Its Own Success

Mainstream financial integration and easier retail and institutional access boosted crypto during the boom and amplified the severity of the recent market collapse.
Silicon Valley
fromReadWrite
1 month ago

Buterin questions prediction markets future direction

Prediction markets risk becoming revenue-driven platforms that prioritize short-term, dopamine-fueled betting over long-term, societally informative market signals.
fromCointelegraph
5 months ago

How Batched Threshold Encryption could end extractive MEV and make DeFi fair again

On most modern blockchains, transaction data is publicly viewable in the mempool before it is sequenced, executed and confirmed in a block. This transparency creates avenues for sophisticated parties to engage in extractive practices known as Maximal Extractable Value (MEV). MEV exploits the block proposer's ability to reorder, include or omit transactions for financial gain.
Cryptocurrency
fromCointelegraph
6 months ago

Applied MEV protection via Shutter's threshold encryption

MEV is especially notorious on Ethereum, where it continues to be extracted at a rate equivalent to 11% of block rewards. Data shows that nearly $300,000 was lost in sandwich attacks in September. This reveals that MEV is a recurring hidden fee, not a minor inefficiency, hitting large trades hardest in volatile markets.
Cryptocurrency
fromNature
2 months ago

Forget formalism: mathematics was built on infighting and emotional turmoil

In the weeks leading up to September 1891, mathematician Georg Cantor prepared an ambush. For years he had sparred - philosophically, mathematically and emotionally - with his formidable rival Leopold Kronecker, one of Germany's most influential mathematicians. Kronecker thought that mathematics should deal only with whole numbers and proofs built from them and therefore rejected Cantor's study of infinity. "God made the integers," Kronecker once said. "All else is the work of man."
History
fromwww.theguardian.com
1 month ago

How cryptocurrency's second largest coin missed out on the industry's boom

Ryan, who had worked for seven years at the Ethereum Foundation (EF), Ethereum's de facto governing body, suggested that Ethereum could be on the cusp of an era-defining shift. Since its founding in 2014, the foundation had prioritized technical upgrades and had avoided centralizing power while its user base was growing, but Ethereum had now grown up, and the cryptocurrency world around it had grown up, too.
US politics
Science
fromWIRED
2 months ago

A New Bridge Links the Strange Math of Infinity to Computer Science

Problems in descriptive set theory can be reformulated as equivalent problems about communication in distributed computer networks, linking infinite-set logic with finite algorithms.
Privacy technologies
fromCointelegraph
1 month ago

Why Privacy Coins Often Appear in Post-Hack Fund Flows

Privacy coins act as a temporary black box in a broader laundering pipeline after hacks, reducing traceability and delaying enforcement while facilitating cash-out attempts.
OMG science
fromwww.scientificamerican.com
1 month ago

What 6-7,' demons and The Big Bang Theory tell us about prime numbers

73 uniquely satisfies linked positional, reversal, and digit-product properties; mathematicians proved no other prime shares all these Sheldon Prime properties.
Venture
from24/7 Wall St.
2 months ago

The Top 3 Cryptos Investors Will Kick Themselves For Not Owning a Decade From Now

Solana's high throughput, low fees, strong network effects, and heavy 2025 activity position it as a leading long-term crypto investment for upside.
Information security
fromCointelegraph
1 month ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
Information security
fromEntrepreneur
1 month ago

Crypto Builders Can't Ignore This Crucial Component Anymore

Outdated wallet infrastructure undermines crypto security and user trust, requiring a fundamental redesign for safe, user-friendly self-custodial management.
fromFortune
2 months ago

I oversee a lab where engineers try to destroy my life's work. It's the only way to prepare for quantum threats | Fortune

This happened in the early 1990s, when I was a young engineer starting an internship at one of the companies that helped create the smart card industry. I believed my card was secure. I believed the system worked. But watching strangers casually extract something that was supposed to be secret and protected was a shock. It was also the moment I realized how insecure security actually is, and the devastating impact security breaches could have on individuals, global enterprises, and governments.
Information security
Cryptocurrency
fromBusiness Matters
2 months ago

Crypto in 2025: EquityGates Experts Review the Key Market Trends of the Year

The 2025 crypto market matured with stronger regulation, greater institutional involvement, and clearer trends reducing panic-driven volatility while Bitcoin and Ethereum remained dominant.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, is essential as the last line of defense to protect sensitive personal data against modern cyber threats.
Information security
fromThe Hacker News
1 month ago

Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

Exposed intentionally vulnerable training applications in active cloud accounts can provide attackers an initial foothold to access and compromise broader cloud infrastructure.
[ Load more ]