{"id":1557,"date":"2015-09-13T11:00:14","date_gmt":"2015-09-13T11:00:14","guid":{"rendered":"http:\/\/www.wired.com\/?p=1848622"},"modified":"2015-09-13T11:00:14","modified_gmt":"2015-09-13T11:00:14","slug":"a-new-design-for-cryptographys-black-box","status":"publish","type":"post","link":"https:\/\/hoo.central12.com\/fugic\/2015\/09\/13\/a-new-design-for-cryptographys-black-box\/","title":{"rendered":"A New Design for Cryptography\u2019s Black Box"},"content":{"rendered":"<div class=\"rss_thumbnail\"><img src=\"http:\/\/www.wired.com\/wp-content\/uploads\/2015\/09\/quanta1-660x359.jpg\" alt=\"A New Design for Cryptography&#8217;s Black Box\" \/><\/div><p>A two-year-old cryptographic breakthrough has proven difficult to put into practice. But new advances show how near-perfect computer security might be surprisingly close at hand.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"http:\/\/www.wired.com\/2015\/09\/new-design-cryptographys-black-box\/\">A New Design for Cryptography&#8217;s Black Box<\/a> appeared first on <a rel=\"nofollow\" href=\"http:\/\/www.wired.com\/\">WIRED<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<div><img decoding=\"async\" src=\"http:\/\/www.wired.com\/wp-content\/uploads\/2015\/09\/quanta1-660x359.jpg\" alt=\"A New Design for Cryptography&rsquo;s Black Box\"><\/div>\n<p>A two-year-old cryptographic breakthrough has proven difficult to put into practice. But new advances show how near-perfect computer security might be surprisingly close at hand.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"http:\/\/www.wired.com\/2015\/09\/new-design-cryptographys-black-box\/\">A New Design for Cryptography&rsquo;s Black Box<\/a> appeared first on <a rel=\"nofollow\" href=\"http:\/\/www.wired.com\/\">WIRED<\/a>.<\/p>\n","protected":false},"author":56,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[208,491,11,4],"tags":[],"class_list":["post-1557","post","type-post","status-publish","format-standard","hentry","category-computer-science","category-cryptography","category-quanta-magazine","category-science"],"_links":{"self":[{"href":"https:\/\/hoo.central12.com\/fugic\/wp-json\/wp\/v2\/posts\/1557"}],"collection":[{"href":"https:\/\/hoo.central12.com\/fugic\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hoo.central12.com\/fugic\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hoo.central12.com\/fugic\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/hoo.central12.com\/fugic\/wp-json\/wp\/v2\/comments?post=1557"}],"version-history":[{"count":2,"href":"https:\/\/hoo.central12.com\/fugic\/wp-json\/wp\/v2\/posts\/1557\/revisions"}],"predecessor-version":[{"id":1559,"href":"https:\/\/hoo.central12.com\/fugic\/wp-json\/wp\/v2\/posts\/1557\/revisions\/1559"}],"wp:attachment":[{"href":"https:\/\/hoo.central12.com\/fugic\/wp-json\/wp\/v2\/media?parent=1557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hoo.central12.com\/fugic\/wp-json\/wp\/v2\/categories?post=1557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hoo.central12.com\/fugic\/wp-json\/wp\/v2\/tags?post=1557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}