Skip to content

Investment Policy

  • Science
  • Analytics
  • Who is Denis Avetisyan?

Science

Quantum-Safe Connections: Assessing the Performance Cost of TLS 1.3 Upgrades

12.03.2026 by Ray Dalio

A new analysis breaks down the latency impact of integrating post-quantum cryptography into the TLS 1.3 handshake process, finding manageable overhead for modern applications.

Categories Science

Navigating the Post-Quantum Landscape with SQInstructor

12.03.2026 by Ray Dalio

A new signature scheme, SQInstructor, expands the SQSign framework and leverages advancements in isogeny graph theory to enhance the security and efficiency of post-quantum cryptography.

Categories Science

Hiding in Plain Sight: Secure Image Steganography Gets a Boost

12.03.2026 by Ray Dalio

A framework emerges for image steganography, achieving both robustness and provable security through iterative optimization within the latent space-a process acknowledging that any architectural choice inevitably seeds the conditions for future compromise.

A new approach leverages the power of diffusion models and iterative refinement to deliver more reliable secret message embedding within images, even after compression.

Categories Science

AI’s New Shield: Securing Autonomous Cyber Defense

12.03.2026 by Ray Dalio

The system employs a multi-agent architecture-built around a central Multi-Agentic SOAR and phase-scoped servers for monitoring, analysis, administration, and reporting-to automate security operations, leveraging LLM-driven reasoning and a persistent organizational memory layer for coordinated incident response across all stages of the lifecycle.

As artificial intelligence takes on a larger role in cybersecurity, a new framework is needed to address the unique risks posed by autonomous, multi-agent systems.

Categories Science

Decoding Equivalence: A New Algebraic Approach to Linear Codes

11.03.2026 by Ray Dalio

This review explores how algebraic modeling, specifically leveraging Plücker coordinates and invariant theory, advances our understanding of linear code equivalence and its implications for cryptographic security.

Categories Science

Pinpointing Quarkonium Splitting with Unprecedented Precision

11.03.2026 by Ray Dalio

The hyperfine splitting of the P-wave bottomonium state for [latex]n=2[/latex] is experimentally determined, with results aligning with theoretical predictions based on a [latex]m_{b,\rm PV} = 4.836 \text{ GeV}[/latex] value for the [latex]b[/latex] quark mass, as established by Ayala et al. (2020).

New calculations achieve next-to-next-to-next-to-next-to-leading order (N4LO) accuracy in determining the hyperfine splitting of heavy quarkonium states.

Categories Science

Playing It Safe: Robust Multi-Agent Learning in Competitive Environments

11.03.2026 by Ray Dalio

Algorithms employing varying levels of risk aversion demonstrate a predictable convergence toward either mutually beneficial cooperation-achieved by non-risk-averse and low-risk-averse agents-or self-protective, though less rewarding, isolation, as evidenced by the consistent selection of stag-stag or hare-hare outcomes during training.

A new algorithm tackles the challenge of training teams of AI agents to cooperate and compete reliably, even when facing unpredictable opponents.

Categories Science

Securing Cloud Workloads: The Lockbox Approach

11.03.2026 by Ray Dalio

Lockbox presents a detailed architecture designed to compartmentalize sensitive data, enabling a robust system for secure storage and access.

A new architecture minimizes risk by ensuring sensitive data remains encrypted even during processing in the cloud.

Categories Science

Beyond Bits: Achieving High-Fidelity Communication with Analog Coding

11.03.2026 by Ray Dalio

The system articulates a foundational approach to image transmission, integrating source coding and channel coding within a unified analog framework-a configuration destined to degrade over time, yet designed to maximize information fidelity within the constraints of a decaying signal.

Researchers have developed a new framework to bring the benefits of analog joint source-channel coding to existing digital WiFi infrastructure.

Categories Science

Secure Search for Many: A New Approach to Data Privacy

11.03.2026 by Ray Dalio

The MASSE scheme establishes a high-level system workflow, integrating multiple components to achieve a cohesive and functional architecture.

Researchers have developed a novel searchable encryption scheme that allows multiple users to securely access data based on their individual permissions.

Categories Science
Older posts
Newer posts
← Previous Page1 … Page39 Page40 Page41 … Page172 Next →
© 2026 Investment Policy • Built with GeneratePress