Article
Wheat in Pennsylvania in 1943 – Image in public domain

Post-quantum cryptography

Ingenious uses of maths have provided the key to internet security, but how can we secure our digital lives in the face of quantum computing?

Article
A Haystack in Nainital (Image by Perplexus – CC-BY-SA-4.0)

Lattice-based cryptography

Find out about lattice-based cryptography – the best candidate for keeping our networks safe in the face of attacks by quantum computers – in this brief introduction.

Article
A lattice generated by basis vectors that aren't at right-angles to each other

Maths in a minute: Lattices

A lattice may seem like a simple regular grid of points, but it leads to fascinating new research in maths and cryptography!

Article
laptop with padlock

Maths in a minute: Cryptography

Ingenious maths keeps your credit card details safe when you shop online and underlies the security of the internet.  Find out how in this easy introduction.

Article
computer

OK computer

There's a romantic vision of mathematicians only needing pen and paper for their work. Here's why this is far from the truth when it comes to mathematical modelling, used to solve problems in the real world.

Article
Close up of milk mixing into coffee (Image: Adobe Stock)

Mixing it up

Researchers from different fields recently came together to improve our understanding of anti-diffusion, the process behind the distinct bands of Jupiter, that also plays a role in our oceans and in developing plasma fusion reactors.

Article
kitten

AI goes to physics class

Combining AI with human knowledge of physics may lead to powerful applications in a range of areas — from weather forecasting to engineering.

Article
cup of tea

Maths in a minute: Diffusion

Whenever you smell the lovely smell of fresh coffee or drop a tea bag into hot water you're benefiting from diffusion. Find a quick introduction to the concept here.