Ethereum’s Shadow Network: A New Eclipse Threat

Researchers demonstrate a practical attack that could isolate Ethereum nodes and disrupt network consensus after the Merge.

Researchers demonstrate a practical attack that could isolate Ethereum nodes and disrupt network consensus after the Merge.
Researchers have developed a systematic method using BRST symmetry to calculate how spinning black holes interact with surrounding fields.
Researchers are exploring innovative methods to encode quantum information in strontium-87 atoms, potentially unlocking more powerful and robust quantum computers.
Researchers have established a broader range of problems where quantum computers demonstrably outperform their classical counterparts, even under strict resource constraints.

New research details a dynamic security framework that uses machine learning to analyze system behavior and prevent malicious encryption attempts.

As neuromorphic systems move from research labs to real-world applications, a comprehensive understanding of their unique security vulnerabilities is becoming critically important.
New research reveals a surprising link between abstract algebra and quantum error correction, offering a radically different foundation for building resilient quantum computers.
![The FrodoKEM hardware cryptographic processor embodies a holistic architectural design, integrating essential components to facilitate efficient and secure key encapsulation mechanisms [latex] KEM [/latex].](https://arxiv.org/html/2601.16500v1/figures/overall-architecture.png)
A new FPGA implementation dramatically accelerates the FrodoKEM post-quantum cryptographic algorithm, offering a practical path towards quantum-resistant security.
![The performance of the improved [latex]\mathsf{M}\text{-}\mathsf{DenSD}[/latex] decoder demonstrates its sensitivity to code parameters, suggesting that nuanced adjustments to these parameters are critical for optimizing its functionality.](https://arxiv.org/html/2601.15903v1/x7.png)
Researchers have developed a novel framework to identify communication channel codes without prior knowledge of their structure, paving the way for more robust and adaptable wireless systems.

A new framework overcomes traditional constraints to embed secret images within cover images at any resolution, enabling high-fidelity recovery without prior knowledge.