Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Quantum Computing without the Linear Algebra [pdf] (iacr.org)
2 points by adamnemecek 7 months ago | past
Quantum Computing without the Linear Algebra [pdf] (iacr.org)
1 point by abhi9u 7 months ago | past
Quantum Computing without the Linear Algebra [pdf] (iacr.org)
2 points by marvel_boy 7 months ago | past
AWS introduces key committing variant of XAES-256-GCM [pdf] (iacr.org)
1 point by HillRat 8 months ago | past
OAuth Audience Injection Attacks [pdf] (iacr.org)
1 point by mooreds 8 months ago | past
Traceable Verifiable Random Functions (iacr.org)
2 points by wslh 9 months ago | past
Collisions for MD4, MD5, HAVAL-128 and RIPEMD (2004) [pdf] (iacr.org)
2 points by kretaceous 9 months ago | past
Constant-time code: the pessimist's case (iacr.org)
1 point by fanf2 9 months ago | past
Keying Merkle-Damgård at the Suffix (iacr.org)
1 point by dchest 10 months ago | past
GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and Tetra [pdf] (iacr.org)
2 points by gnabgib 10 months ago | past
Constant-Time Code: The Pessimist Case [pdf] (iacr.org)
92 points by yuedongze 10 months ago | past | 66 comments
Constant-time coding is, or will soon become, infeasible in all generality [pdf] (iacr.org)
1 point by jedisct1 10 months ago | past
How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org)
2 points by pbrowne011 12 months ago | past
ColliderScript: Covenants in Bitcoin via 160-bit hash collisions (iacr.org)
2 points by noch on Jan 23, 2025 | past
Approaches to Solving SVP in Lattice Cryptography with Quantum Gravity (iacr.org)
1 point by noam_k on Jan 13, 2025 | past
CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust (iacr.org)
1 point by EvgeniyZh on Jan 13, 2025 | past
Knot-based Key Exchange protocol (iacr.org)
1 point by RadixDLT on Dec 17, 2024 | past
Chosen-Prefix Collisions on AES-Like Hashing (iacr.org)
2 points by pentestercrab on Nov 25, 2024 | past
Quantum One-Shot Signatures (iacr.org)
2 points by fbrusch on Sept 26, 2024 | past
PQ-HPKE: Post-Quantum Hybrid Public Key Encryption (iacr.org)
1 point by teleforce on Sept 23, 2024 | past
Pulsar: Secure Steganography for Diffusion Models (iacr.org)
41 points by aliventer on Sept 22, 2024 | past | 3 comments
Provable Security of Linux-DRBG in the Seedless Robustness Model [pdf] (iacr.org)
43 points by zx2c4 on Sept 16, 2024 | past | 3 comments
Efficient Secret Sharing for Large-Scale Applications [pdf] (iacr.org)
5 points by hundredwatt on Sept 10, 2024 | past
SoK: The Engineer's Guide to Post-Quantum Cryptography for Embedded Devices (iacr.org)
2 points by simonpure on Sept 4, 2024 | past
RSA-Based Dynamic Accumulator Without Hashing into Primes (iacr.org)
2 points by simonpure on Sept 4, 2024 | past
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM (iacr.org)
101 points by belter on Aug 30, 2024 | past | 48 comments
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM (iacr.org)
1 point by speckx on Aug 29, 2024 | past
Shufflecake: Plausible deniability for hidden filesystems on Linux (2023) (iacr.org)
66 points by simonpure on Aug 24, 2024 | past | 23 comments
MIFARE Classic: exposing the static encrypted nonce variant [pdf] (iacr.org)
250 points by dave_universetf on Aug 16, 2024 | past | 95 comments
The Impact of Time on DNS Security (2019) [pdf] (iacr.org)
3 points by indigodaddy on Aug 12, 2024 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: