| | The Death of Due Process (cr.yp.to) |
| 2 points by elcapitan on June 7, 2016 | past | 1 comment |
|
| | Daniel J. Bernstein: The death of due process (cr.yp.to) |
| 26 points by Jerry2 on June 7, 2016 | past | 4 comments |
|
| | NTRU Prime [pdf] (cr.yp.to) |
| 3 points by jakobdabo on May 17, 2016 | past |
|
| | Security Fraud in Europe's “Quantum Manifesto” (cr.yp.to) |
| 55 points by okket on May 17, 2016 | past | 33 comments |
|
| | Security Fraud in Europe's “Quantum Manifesto” (cr.yp.to) |
| 2 points by dfc on May 17, 2016 | past |
|
| | Some thoughts on security after ten years of qmail 1.0 (2007) [pdf] (cr.yp.to) |
| 1 point by panic on May 4, 2016 | past |
|
| | Is the security of quantum cryptography guaranteed by the laws of physics? [pdf] (cr.yp.to) |
| 1 point by notfed on April 10, 2016 | past |
|
| | Is the security of quantum cryptography guaranteed by the laws of physics? [pdf] (cr.yp.to) |
| 3 points by colinprince on March 30, 2016 | past |
|
| | [dupe] Thomas Jefferson and Apple versus the FBI (cr.yp.to) |
| 2 points by jgrahamc on March 16, 2016 | past |
|
| | Thomas Jefferson and Apple versus the FBI (cr.yp.to) |
| 217 points by lx on March 15, 2016 | past | 51 comments |
|
| | The first 10 years of Curve25519 [pdf] (cr.yp.to) |
| 1 point by fcambus on March 14, 2016 | past |
|
| | The DNS Security Mess [pdf] (cr.yp.to) |
| 2 points by dbalan on March 8, 2016 | past |
|
| | Entropy Attacks (hashing more entropy sources can hurt) (cr.yp.to) |
| 1 point by planckscnst on Feb 10, 2016 | past |
|
| | Placing documents into the public domain (2008) (cr.yp.to) |
| 19 points by aburan28 on Jan 25, 2016 | past | 19 comments |
|
| | Failures in NIST’s ECC standards [pdf] (cr.yp.to) |
| 1 point by zdw on Jan 7, 2016 | past |
|
| | SPHINCS: practical stateless hash-based signatures (cr.yp.to) |
| 2 points by jonbaer on Dec 28, 2015 | past | 1 comment |
|
| | Break a dozen secret keys, get a million more for free (cr.yp.to) |
| 110 points by tptacek on Nov 20, 2015 | past | 16 comments |
|
| | Entropy Attacks (2014) (cr.yp.to) |
| 4 points by monort on Nov 12, 2015 | past |
|
| | SafeCurves: choosing safe curves for elliptic-curve cryptography (cr.yp.to) |
| 2 points by monort on Oct 13, 2015 | past |
|
| | How to manipulate curve standards: a white paper for the black hat [pdf] (cr.yp.to) |
| 76 points by tetrep on Oct 12, 2015 | past | 10 comments |
|
| | Boring Crypto [pdf] (cr.yp.to) |
| 91 points by zdw on Oct 7, 2015 | past | 24 comments |
|
| | How to manipulate curve standards (djb) [pdf] (cr.yp.to) |
| 5 points by rurban on Sept 30, 2015 | past | 1 comment |
|
| | Brainpool curves (cr.yp.to) |
| 39 points by grey-area on Sept 28, 2015 | past | 6 comments |
|
| | Understanding Brute Force (2005) [pdf] (cr.yp.to) |
| 22 points by kushti on Sept 16, 2015 | past |
|
| | Snake Oil Crypto Competition (cr.yp.to) |
| 104 points by aburan28 on Aug 15, 2015 | past | 20 comments |
|
| | Unix Client-Server Program Interface (1996) (cr.yp.to) |
| 11 points by gandarojin on June 29, 2015 | past | 3 comments |
|
| | Calculus for mathematicians (1997) [pdf] (cr.yp.to) |
| 106 points by bumbledraven on May 28, 2015 | past | 86 comments |
|
| | Djb: How to manipulate standards [pdf] (cr.yp.to) |
| 2 points by wtbob on May 19, 2015 | past |
|
| | The death of optimizing compilers [pdf] (cr.yp.to) |
| 217 points by fcambus on April 17, 2015 | past | 216 comments |
|
| | The death of optimizing compilers [pdf] (cr.yp.to) |
| 2 points by fcambus on April 17, 2015 | past |
|
|
| More |