Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Break Me If You Can – Attacks Against 3DES/AES NFC Technologies (iacr.org)
2 points by netsec_burn 15 hours ago | past | discuss
Qurrency: A quantum-secure, private, and auditable platform for digital assets (iacr.org)
1 point by shorsher 5 days ago | past | discuss
L for the Price of One: On the Benefits of Using more than t+1 Parties in Thres [pdf] (iacr.org)
1 point by todsacerdoti 8 days ago | past | discuss
Parallelizable threshold ECDSA with more than t+1 parties (iacr.org)
1 point by badcryptobitch 8 days ago | past | discuss
Hax: Verifying Security-Critical Rust Software Using Multiple Provers (iacr.org)
2 points by forks 9 days ago | past | discuss
From collisions to chosen-prefix collisions, applied to full SHA-1 [pdf] (iacr.org)
1 point by fanf2 31 days ago | past | 1 comment
Ask Your Cryptographer If Context-Committing AEAD Is Right for You (iacr.org)
3 points by nabla9 42 days ago | past
IACR 2025 election cannot be verified due to lost decryption key (iacr.org)
2 points by T3OU-736 63 days ago | past | 1 comment
IACR Election 2025 Update (iacr.org)
6 points by layer8 63 days ago | past
International Crypto Association elections botched by loss of key (iacr.org)
8 points by tomgag 64 days ago | past | 3 comments
SoK: Blockchain Oracles Between Theory and Practice (iacr.org)
1 point by altro 70 days ago | past
A Systematic Analysis of the Juniper Dual EC Incident (2016) [pdf] (iacr.org)
2 points by mooreds 79 days ago | past
On the Distribution of the Distances of Random Words (iacr.org)
3 points by quantumgarbage 84 days ago | past | 1 comment
Security Mesh Monitoring Using Low-Cost, Embedded Time Domain Reflectometry (iacr.org)
2 points by ahlCVA 3 months ago | past
Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical (iacr.org)
1 point by nabla9 3 months ago | past
High-Throughput Universally Composable Threshold FHE Decryption (iacr.org)
2 points by badcryptobitch 3 months ago | past
Practical seed recovery for the PCG pseudo-random number generator (iacr.org)
3 points by fanf2 3 months ago | past | 1 comment
Lookup Table Arguments Systematization of Knowledge (iacr.org)
3 points by altro 3 months ago | past
Subverting Telegram's end-to-end encryption (2023) (iacr.org)
105 points by pona-a 3 months ago | past | 92 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir [pdf] (iacr.org)
4 points by todsacerdoti 4 months ago | past
Camera Zoom Based Cipher Encryption Scheme or Strengthen Weak Encryption (iacr.org)
4 points by gananthraman 4 months ago | past
Tlock: Practical timelock encryption from threshold BLS (2023) [pdf] (iacr.org)
2 points by wslh 5 months ago | past
Coral: Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs (iacr.org)
1 point by petethomas 5 months ago | past
How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org)
2 points by belter 5 months ago | past
Replication of Quantum Factorisation Records with a VIC-20, an Abacus, and a Dog (iacr.org)
84 points by teddyh 6 months ago | past | 25 comments
Replication of Quantum Factorisation Records; a Home Computer, Abacus, and a Dog (iacr.org)
1 point by ChuckMcM 6 months ago | past | 2 comments
Formal Security & Verification of Cryptographic Protocol Implementations in Rust (iacr.org)
2 points by matt_d 6 months ago | past
Replication of Quantum Factorisation with an 8-Bit Computer, an Abacus and a Dog (iacr.org)
3 points by indy 6 months ago | past
Replication of Quantum Factorisation Records with an 8-bit Home Computer [pdf] (iacr.org)
137 points by sebgan 6 months ago | past | 32 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org)
6 points by Bluestein 6 months ago | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: