Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
OpenPubkey: Augmenting OpenID Connect with User Held Signing Keys (PDF) (iacr.org)
4 points by EthanHeilman on July 18, 2023 | past
Fast modular squaring with AVX512IFMA (2018) [pdf] (iacr.org)
36 points by peter_d_sherman on July 14, 2023 | past
How to Cheat at Chess: A security analysis of the Internet Chess Club (2004) [pdf] (iacr.org)
2 points by TechBro8615 on July 4, 2023 | past
On the 32-Character Zodiac Cipher (iacr.org)
3 points by simonpure on June 30, 2023 | past
Paper about a new encryption method that also prove that P != NP (iacr.org)
3 points by man_of_wax on June 25, 2023 | past | 4 comments
Extracting Cryptographic Keys from Video Footage of a Device’s Power LED (iacr.org)
1 point by exo762 on June 20, 2023 | past | 1 comment
Verifiable Distributed Aggregation Functions [pdf] (iacr.org)
2 points by simonpure on June 19, 2023 | past
The curious case of the half-half Bitcoin ECDSA nonces (iacr.org)
1 point by gslin on June 7, 2023 | past
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol (iacr.org)
1 point by gslin on June 7, 2023 | past
Undetectable Watermarks for Language Models (iacr.org)
135 points by cryptohell on June 2, 2023 | past | 69 comments
(Provably) Undetectable Watermarks for LLMs (iacr.org)
1 point by cryptohell on May 30, 2023 | past
Research Philosophy of Modern Cryptography (iacr.org)
47 points by luu on May 27, 2023 | past | 2 comments
Review of the Book Introduction to Cryptography with Open-Source Software [pdf] (iacr.org)
2 points by teleforce on May 24, 2023 | past
A Needle in the Haystack: Inspecting Circuit Layout to Identify Hardware Trojans [pdf] (iacr.org)
5 points by PaulHoule on May 10, 2023 | past
Ultimate SLH: Taking Speculative Load Hardening to the Next Level (iacr.org)
1 point by g0xA52A2A on May 1, 2023 | past
Batched Merkle tree signatures in TLS (iacr.org)
1 point by yuedongze on April 5, 2023 | past
Get a Cake: Generic Transformations to Password Authenticated Key Exchanges (iacr.org)
1 point by conductor on April 3, 2023 | past
CPU to FPGA Power Covert Channel in FPGA-SoCs (iacr.org)
2 points by PaulHoule on March 31, 2023 | past
Subverting Telegram’s End-to-End Encryption (iacr.org)
2 points by ototot on March 26, 2023 | past | 1 comment
A Vulnerability in Implementations of SHA-3, Shake, EdDSA, and Other NIST-Appro [pdf] (iacr.org)
1 point by todsacerdoti on March 12, 2023 | past
Analysis of Ripemd-160: New Collision Attacks and Finding Characteristics with [pdf] (iacr.org)
1 point by todsacerdoti on March 12, 2023 | past
A Vulnerability in Implementations of SHA-3, Shake, EdDSA (iacr.org)
185 points by state on March 7, 2023 | past | 47 comments
Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography (iacr.org)
59 points by Laaas on March 5, 2023 | past | 7 comments
Side-channel attack on CRYSTALS-Kyber, selected post-quantun cipher [pdf] (iacr.org)
2 points by lknik on March 1, 2023 | past
A security analysis comparison between Signal, WhatsApp and Telegram (iacr.org)
3 points by jjav on Jan 23, 2023 | past
A Practical Template Attack on Crystals-Dilithium [pdf] (iacr.org)
2 points by todsacerdoti on Jan 20, 2023 | past
A Gentle Tutorial for Lattice-Based Cryptanalysis [pdf] (iacr.org)
14 points by todsacerdoti on Jan 20, 2023 | past | 1 comment
Fermat Factorization in the Wild (iacr.org)
1 point by rcarmo on Jan 10, 2023 | past
Fermat Factorization in the Wild (iacr.org)
1 point by _Microft on Jan 9, 2023 | past
Reinforced Concrete: A Fast Hash Function for Verifiable Computation (iacr.org)
1 point by simonpure on Dec 16, 2022 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: