Items waiting in the Pocket queue: 3527

Enter one or more words
Enter one or more words
Enter one or more words
Public-private key system... Take a public key based on a huge number which is the result of two prime numbers multiplied together (a prime number being one which can be divided only by itself or by one). You use this number to encode your message but you do not need to know the two original prime numbers. Only the person decoding the message needs to know, because the text was encoded using an equation and both numbers are needed to...


In 1952 Turing was prosecuted for gross indecency after admitting a sexual relationship with a man. Two years later he killed himself.


 Alan Turing gay mathematics cryptography artificial intelligence is a computer security Web site dedicated to the collection, dissemination and distribution of information about the industry for anyone interested in the subject. They maintain one of the largest catalogs of security advisories, text files, and humorous image galleries. They are also known for the largest mirror of Web site defacements and their crusade to expose industry frauds and inform the public about incorrect...
 cryptography hacking Internet security computer
Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux
 encryption open source cryptography software
Scientists have found that by varying the voltage to key parts of a computer's processor, the ability to keep this data secret is compromised.


 security cryptography CPU encryption chip voltage hacking
A science historian in Manchester claims to have deciphered secret messages hidden in the ancient writings of the philosopher Plato.


 history Plato philosophy Pythagoras cryptography mathematics science hiding music sonification
A novel use of encryption by whistle-blowing website Wikileaks could "challenge the legal system for years to come," according to an influential observer of the hacking community.


 WikiLeaks cryptography politics insurance file
A project that could radically reduce the amount of personal information we share in our dealings has been revealed by IBM researchers.


 privacy cryptography identification
The National Museum of Computing has finished restoring a Tunny machine - a key part of Allied code-cracking during World War II.


 encryption WWII cryptography hacking history computer