Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Breaking Halfloop-24 (iacr.org)
1 point by wglb on Sept 18, 2022 | past
Breaking SIDH in polynomial time [pdf] (iacr.org)
2 points by mooreds on Aug 31, 2022 | past
Breaking SIDH in Polynomial Time (iacr.org)
3 points by g0xA52A2A on Aug 11, 2022 | past | 1 comment
Too Much Crypto (2019) [pdf] (iacr.org)
1 point by woodruffw on Aug 6, 2022 | past
Critical perspectives on provable security (2019) [pdf] (iacr.org)
1 point by Tomte on Aug 3, 2022 | past
Post-quantum cryptography–-dealing with the fallout of physics success (iacr.org)
3 points by anupj on Aug 2, 2022 | past
An efficient key recovery attack on SIDH [pdf] (iacr.org)
1 point by arkadiyt on July 30, 2022 | past
An efficient key recovery attack on SIDH (iacr.org)
52 points by robinhouston on July 30, 2022 | past | 14 comments
(In)security of the Radio Interface in Sigfox [pdf] (iacr.org)
3 points by teleforce on July 30, 2022 | past
Cryptanalyzing MEGA in Six Queries (iacr.org)
44 points by rudyruiz on July 16, 2022 | past | 11 comments
Cryptanalyzing Mega in Six Queries [pdf] (iacr.org)
3 points by edenceover on July 15, 2022 | past
Unclonable Polymers and Their Cryptographic Applications (iacr.org)
35 points by somezero on May 31, 2022 | past | 9 comments
Provable Security Analysis of FIDO2 (iacr.org)
1 point by simonpure on May 30, 2022 | past
Anamorphic Encryption: Private Communication Against a Dictator (iacr.org)
3 points by homarp on May 27, 2022 | past
Seedless Fruit Is the Sweetest: Random Number Generation, Revisited (2019) (iacr.org)
1 point by rdpintqogeogsaa on May 26, 2022 | past
Caulk: Lookup Arguments in Sublinear Time (iacr.org)
2 points by ricochet11 on May 24, 2022 | past
Private Approximate Nearest Neighbor Search with Sublinear Communication [pdf] (iacr.org)
2 points by taubek on May 20, 2022 | past
On the Cryptographic Fragility of the Telegram Ecosystem (iacr.org)
2 points by mritzmann on May 17, 2022 | past
On the (in)security of ElGamal in OpenPGP [pdf] (iacr.org)
3 points by rdpintqogeogsaa on May 6, 2022 | past
What Cryptographic Library Developers Think About Timing Attacks (2021) [pdf] (iacr.org)
2 points by mooreds on May 5, 2022 | past
Zero-Knowledge Middleboxes: enforce network policies on encrypted traffic (iacr.org)
82 points by self on April 17, 2022 | past | 20 comments
To Shift or Not to Shift: Understanding GEA-1 [pdf] (iacr.org)
1 point by pabs3 on March 25, 2022 | past
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 [pdf] (iacr.org)
3 points by pabs3 on March 25, 2022 | past
Breaking Rainbow Takes a Weekend on a Laptop [pdf] (iacr.org)
3 points by simonebrunozzi on March 23, 2022 | past
Base64 Malleability in Practice (iacr.org)
2 points by rdpintqogeogsaa on March 18, 2022 | past
How Practical Are Fault Injection Attacks, Really? (iacr.org)
2 points by rdpintqogeogsaa on March 8, 2022 | past
Two Attacks on Proof-of-Stake Ghost/Ethereum (iacr.org)
2 points by photon12 on March 8, 2022 | past
Trust dies in darkness: Shedding light on Samsung’s TrustZone Keymaster design [pdf] (iacr.org)
165 points by zdw on March 4, 2022 | past | 27 comments
Samsung Encryption Vulnerability [pdf] (iacr.org)
1 point by News-Dog on March 1, 2022 | past
Breaking Rainbow Takes a Weekend on a Laptop [pdf] (iacr.org)
2 points by DyslexicAtheist on Feb 25, 2022 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: