Beefing up public-key encryption
February 15, 2013MIT researchers show how to secure widely used encryption schemes against attackers who have intercepted examples of successful decryption.
10-year-old problem in theoretical computer science falls
July 31, 2012Interactive proofs — mathematical games that underlie much modern cryptography — work even if players try to use quantum information to cheat.
Thwarting the cleverest attackers
May 1, 2012Savvy hackers can steal a computer’s secrets by timing its data storage transactions or measuring its power use. New research shows how to stop them.
April 25, 2012A new twist on pioneering work done by MIT cryptographers almost 30 years ago could lead to better ways of structuring contracts.
Rivest unlocks cryptography's past, looks toward future
February 15, 2011Public-key system has worked and made Internet commerce feasible, but new systems are ready in case flaws are found.
Cryptographic voting debuts
November 13, 2009A new system for ensuring accurate election tallies, which MIT researchers helped to develop, passed its first real-world test last Tuesday.
Detailed explanation of how the voting encryption system works
November 13, 2009