Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
The Death of Due Process (cr.yp.to)
2 points by elcapitan on June 7, 2016 | past | 1 comment
Daniel J. Bernstein: The death of due process (cr.yp.to)
26 points by Jerry2 on June 7, 2016 | past | 4 comments
NTRU Prime [pdf] (cr.yp.to)
3 points by jakobdabo on May 17, 2016 | past
Security Fraud in Europe's “Quantum Manifesto” (cr.yp.to)
55 points by okket on May 17, 2016 | past | 33 comments
Security Fraud in Europe's “Quantum Manifesto” (cr.yp.to)
2 points by dfc on May 17, 2016 | past
Some thoughts on security after ten years of qmail 1.0 (2007) [pdf] (cr.yp.to)
1 point by panic on May 4, 2016 | past
Is the security of quantum cryptography guaranteed by the laws of physics? [pdf] (cr.yp.to)
1 point by notfed on April 10, 2016 | past
Is the security of quantum cryptography guaranteed by the laws of physics? [pdf] (cr.yp.to)
3 points by colinprince on March 30, 2016 | past
[dupe] Thomas Jefferson and Apple versus the FBI (cr.yp.to)
2 points by jgrahamc on March 16, 2016 | past
Thomas Jefferson and Apple versus the FBI (cr.yp.to)
217 points by lx on March 15, 2016 | past | 51 comments
The first 10 years of Curve25519 [pdf] (cr.yp.to)
1 point by fcambus on March 14, 2016 | past
The DNS Security Mess [pdf] (cr.yp.to)
2 points by dbalan on March 8, 2016 | past
Entropy Attacks (hashing more entropy sources can hurt) (cr.yp.to)
1 point by planckscnst on Feb 10, 2016 | past
Placing documents into the public domain (2008) (cr.yp.to)
19 points by aburan28 on Jan 25, 2016 | past | 19 comments
Failures in NIST’s ECC standards [pdf] (cr.yp.to)
1 point by zdw on Jan 7, 2016 | past
SPHINCS: practical stateless hash-based signatures (cr.yp.to)
2 points by jonbaer on Dec 28, 2015 | past | 1 comment
Break a dozen secret keys, get a million more for free (cr.yp.to)
110 points by tptacek on Nov 20, 2015 | past | 16 comments
Entropy Attacks (2014) (cr.yp.to)
4 points by monort on Nov 12, 2015 | past
SafeCurves: choosing safe curves for elliptic-curve cryptography (cr.yp.to)
2 points by monort on Oct 13, 2015 | past
How to manipulate curve standards: a white paper for the black hat [pdf] (cr.yp.to)
76 points by tetrep on Oct 12, 2015 | past | 10 comments
Boring Crypto [pdf] (cr.yp.to)
91 points by zdw on Oct 7, 2015 | past | 24 comments
How to manipulate curve standards (djb) [pdf] (cr.yp.to)
5 points by rurban on Sept 30, 2015 | past | 1 comment
Brainpool curves (cr.yp.to)
39 points by grey-area on Sept 28, 2015 | past | 6 comments
Understanding Brute Force (2005) [pdf] (cr.yp.to)
22 points by kushti on Sept 16, 2015 | past
Snake Oil Crypto Competition (cr.yp.to)
104 points by aburan28 on Aug 15, 2015 | past | 20 comments
Unix Client-Server Program Interface (1996) (cr.yp.to)
11 points by gandarojin on June 29, 2015 | past | 3 comments
Calculus for mathematicians (1997) [pdf] (cr.yp.to)
106 points by bumbledraven on May 28, 2015 | past | 86 comments
Djb: How to manipulate standards [pdf] (cr.yp.to)
2 points by wtbob on May 19, 2015 | past
The death of optimizing compilers [pdf] (cr.yp.to)
217 points by fcambus on April 17, 2015 | past | 216 comments
The death of optimizing compilers [pdf] (cr.yp.to)
2 points by fcambus on April 17, 2015 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: