Electrical, Electronics, and Avionics

Cryptography

Latest Stories

Briefs
Photonics/Optics

Free-Space Quantum Communications in Harsh Environments

The project aims to explore the possibility of all-weather secure quantum communication using macroscopic quantum states of light.

Feature Image

Articles
Communications

The Next Generation of Mission-Critical Communications Infrastructure is Here

The critical role of spectrum superiority in the success of battlefield campaigns is evidenced by the enormous investments being made in electronic warfare (EW)...

Feature Image

Application Briefs
Software

Security IP Module

Curtiss-Wright Defense Solutions Ashburn, VA
703-779-7800
www.curtisswright.com

Curtiss-Wright Defense Solutions, a leading proponent of modular open systems approach (MOSA) based solutions, announced that it...

Feature Image

Briefs
Test & Measurement

FPGAs and HPC

A study determined the value of Field Programmable Gate Arrays (FPGAs) for high-performance computing (HPC) applications.

Feature Image

Articles
Data Acquisition

Information Warfare: Staying Protected at the Edge

Securing data shared and stored on the battlefield will require hardware with built-in cybersecurity features

Feature Image

Articles
AR/AI

Development of a Secure Private Neural Network Capability

Learn how to fully implement a Secure Private Neural Network.

Feature Image

News
Data Acquisition

Dolphin Technologies Introduces Cryptocurrency Aimed at Reducing Mobile Phone-Related Accidents

Austrian telematics company, Dolphin Technologies GmbH, has created a new cryptocurrency that could lead to less mobile phone-related...

Feature Image

News
Automotive

MOBI Rolls out the First Blockchain-Enabled Vehicle Identity (VID) Mobility Standard

The Mobility Open Blockchain Initiative (MOBI) – a global nonprofit working to create standards in blockchain, distributed ledgers, and related...

Feature Image

News
Internet of Things

Europe’s Blockchain-Based Smart E-Mobility Challenge Will Conclude This May in Germany

To advance development of Internet of things (IoT) mobility solutions like cryptography, distributed ledger technology (DLT) – also known as...

Feature Image

News
Manufacturing & Prototyping

BlackBerry’s CTO Points to a Holistic and Standards-Based Future for Vehicle Cybersecurity

The days of automobiles as physical transportation devices is quickly shifting into an era of vehicles as rolling digital hubs. With multiple...

Feature Image

News
Connectivity

5G Cellular May Be Transformational for Automakers, Suppliers

Connected vehicles are going mainstream, autonomous vehicles are poised to emerge—and cellular communications appears to be a central infrastructural base for both. The...

Feature Image

News
Imaging

WCX 2019: IAMTS Association Will Establish Standardization and Testing for Connected Vehicles

In pursuit of developing and growing an international portfolio of advanced mobility testbeds that meet the highest quality implementation and...

Feature Image

News
Connectivity

For Auto Industry, Blockchain Still in Formative Phases

The automotive industry continues to ride the blockchain bandwagon, evaluating potential uses and helping develop the infrastructure for using distributed-ledger technology (DLT) in...

Feature Image

News
Regulations/Standards

Challenges Ahead: Cybersecurity and the Aerospace Supply Chain

Digital data is transforming commercial aviation, driving efficiencies throughout air transportation and the supply chain, but it also introduces risk. Supply chains have...

Feature Image

News
Manufacturing & Prototyping

ZF Spins off Autonomous-Payment Company

Taking aim at automated valet parking and other autonomous-vehicle operations that involve payment transactions, Car eWallet GmbH has been spun out as a startup. The move was made after...

Feature Image

News
Unmanned Systems

'Function on Demand' Brings Opportunities, Security Challenges

The motorist is on a vacation in his leased car, a minimally-equipped vehicle for which the low price was an incentive. But now he temporarily would like some of the features...

Feature Image

Articles
Test & Measurement

A Hardware-Centric Approach to Countering Side-Channel Threats

From laptops and mobile devices to cars and airplanes, we are seeing near-daily threats to the systems and devices we use. Systems being used and deployed in the aerospace and...

Feature Image

Articles
Defense

DPA Countermeasures — Theory vs. Practice

The Threat

In today’s interconnected world, the information that we generate, store, transmit, and receive has become a valuable commodity. We have increasingly turned to cryptography as a tool...

Feature Image

Articles
Aerospace

Next-Generation Mobile Tactical Communications

After many years of development and well-publicized budget overruns, the DoD’s Joint Tactical Radio System program (since reorganized and renamed) has recently given birth to a set of handheld...

Feature Image

Briefs
Physical Sciences

Frangible Polymer Circuit Acts as Tamper Sensor

Originally begun as an investigation to detect attempts to tap into an electrical cable, the emergence of modern encryption hardware rendered impractical attempts to protect communication media...

Feature Image

Briefs
Software

Software Suite for a Large Defense System

A suite of software tools was developed to enable networks composed of many hundreds, thousands, or even millions of commodity computers to protect themselves against a variety of security threats. These tools include Anagram, a content-based anomaly detection (AD) tool; ASSURE, which provides automatic...

Briefs
Electronics & Computers

Asynchronous Architectures for Large-Integer Processors

New architectures have been developed for cryptographic hardware that offer high throughput, algorithm flexibility, radiation hardness, and low power. The asynchronous (clockless) architecture combines a dedicated large-integer processor (LIP), a field programmable gate array (FPGA), and a...

Briefs
Photonics/Optics

Cyberspace Security via Quantum Encryption

Perfect information- theoretical security requires that the meaning of an encrypted message transmitted from point A to point B be statistically independent of the ciphertext in which that message...

Feature Image