Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Break Me If You Can – Attacks Against 3DES/AES NFC Technologies
(
iacr.org
)
2 points
by
netsec_burn
15 hours ago
|
past
|
discuss
Qurrency: A quantum-secure, private, and auditable platform for digital assets
(
iacr.org
)
1 point
by
shorsher
5 days ago
|
past
|
discuss
L for the Price of One: On the Benefits of Using more than t+1 Parties in Thres [pdf]
(
iacr.org
)
1 point
by
todsacerdoti
8 days ago
|
past
|
discuss
Parallelizable threshold ECDSA with more than t+1 parties
(
iacr.org
)
1 point
by
badcryptobitch
8 days ago
|
past
|
discuss
Hax: Verifying Security-Critical Rust Software Using Multiple Provers
(
iacr.org
)
2 points
by
forks
9 days ago
|
past
|
discuss
From collisions to chosen-prefix collisions, applied to full SHA-1 [pdf]
(
iacr.org
)
1 point
by
fanf2
31 days ago
|
past
|
1 comment
Ask Your Cryptographer If Context-Committing AEAD Is Right for You
(
iacr.org
)
3 points
by
nabla9
42 days ago
|
past
IACR 2025 election cannot be verified due to lost decryption key
(
iacr.org
)
2 points
by
T3OU-736
63 days ago
|
past
|
1 comment
IACR Election 2025 Update
(
iacr.org
)
6 points
by
layer8
63 days ago
|
past
International Crypto Association elections botched by loss of key
(
iacr.org
)
8 points
by
tomgag
64 days ago
|
past
|
3 comments
SoK: Blockchain Oracles Between Theory and Practice
(
iacr.org
)
1 point
by
altro
70 days ago
|
past
A Systematic Analysis of the Juniper Dual EC Incident (2016) [pdf]
(
iacr.org
)
2 points
by
mooreds
79 days ago
|
past
On the Distribution of the Distances of Random Words
(
iacr.org
)
3 points
by
quantumgarbage
84 days ago
|
past
|
1 comment
Security Mesh Monitoring Using Low-Cost, Embedded Time Domain Reflectometry
(
iacr.org
)
2 points
by
ahlCVA
3 months ago
|
past
Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical
(
iacr.org
)
1 point
by
nabla9
3 months ago
|
past
High-Throughput Universally Composable Threshold FHE Decryption
(
iacr.org
)
2 points
by
badcryptobitch
3 months ago
|
past
Practical seed recovery for the PCG pseudo-random number generator
(
iacr.org
)
3 points
by
fanf2
3 months ago
|
past
|
1 comment
Lookup Table Arguments Systematization of Knowledge
(
iacr.org
)
3 points
by
altro
3 months ago
|
past
Subverting Telegram's end-to-end encryption (2023)
(
iacr.org
)
105 points
by
pona-a
3 months ago
|
past
|
92 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir [pdf]
(
iacr.org
)
4 points
by
todsacerdoti
4 months ago
|
past
Camera Zoom Based Cipher Encryption Scheme or Strengthen Weak Encryption
(
iacr.org
)
4 points
by
gananthraman
4 months ago
|
past
Tlock: Practical timelock encryption from threshold BLS (2023) [pdf]
(
iacr.org
)
2 points
by
wslh
5 months ago
|
past
Coral: Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs
(
iacr.org
)
1 point
by
petethomas
5 months ago
|
past
How to Prove False Statements: Practical Attacks on Fiat-Shamir
(
iacr.org
)
2 points
by
belter
5 months ago
|
past
Replication of Quantum Factorisation Records with a VIC-20, an Abacus, and a Dog
(
iacr.org
)
84 points
by
teddyh
6 months ago
|
past
|
25 comments
Replication of Quantum Factorisation Records; a Home Computer, Abacus, and a Dog
(
iacr.org
)
1 point
by
ChuckMcM
6 months ago
|
past
|
2 comments
Formal Security & Verification of Cryptographic Protocol Implementations in Rust
(
iacr.org
)
2 points
by
matt_d
6 months ago
|
past
Replication of Quantum Factorisation with an 8-Bit Computer, an Abacus and a Dog
(
iacr.org
)
3 points
by
indy
6 months ago
|
past
Replication of Quantum Factorisation Records with an 8-bit Home Computer [pdf]
(
iacr.org
)
137 points
by
sebgan
6 months ago
|
past
|
32 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir
(
iacr.org
)
6 points
by
Bluestein
6 months ago
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: