| | Cr.yp.to blog 2017.07.19: Benchmarking post-quantum cryptography (cr.yp.to) |
| 3 points by eurg on July 21, 2017 | past |
|
| | Gimli: a cross-platform permutation (cr.yp.to) |
| 1 point by jedisct1 on July 5, 2017 | past | 1 comment |
|
| | SafeCurves – Choosing safe curves for elliptic-curve cryptography (cr.yp.to) |
| 2 points by spurlock on July 1, 2017 | past |
|
| | Qhasm: tools to help write high-speed software (cr.yp.to) |
| 64 points by sr2 on May 19, 2017 | past | 7 comments |
|
| | Does a free swap turn a stack into a traditional register set? (2005) (cr.yp.to) |
| 21 points by Tomte on May 19, 2017 | past | 4 comments |
|
| | SPHINCS: practical stateless hash-based signatures (cr.yp.to) |
| 1 point by snakeanus on May 16, 2017 | past |
|
| | The Devil's Guide to Conclusions (cr.yp.to) |
| 1 point by dsacco on May 9, 2017 | past |
|
| | The death of optimizing compilers [pdf] (cr.yp.to) |
| 1 point by fulafel on May 2, 2017 | past | 1 comment |
|
| | CTF Challenge CHES 2017: Obfuscate AES (cr.yp.to) |
| 2 points by lynxocrypt on April 27, 2017 | past |
|
| | Post-quantum RSA (1 TB key size) [pdf] (cr.yp.to) |
| 3 points by hannob on April 20, 2017 | past |
|
| | SafeCurves: choosing safe curves for elliptic-curve cryptography (cr.yp.to) |
| 1 point by hdhzy on April 13, 2017 | past |
|
| | D. J. Bernstein – False Statements by Henry de Valence (cr.yp.to) |
| 27 points by lx on March 24, 2017 | past | 2 comments |
|
| | Statement from djb regarding 'payroll' accusations (cr.yp.to) |
| 8 points by okket on March 23, 2017 | past |
|
| | TweetNaCl: a crypto library in 100 tweets (cr.yp.to) |
| 3 points by adgasf on March 10, 2017 | past |
|
| | Challenges in Authenticated Encryption [pdf] (cr.yp.to) |
| 2 points by remx on March 10, 2017 | past |
|
| | Challenges in Authenticated Encryption (cr.yp.to) |
| 2 points by panic on March 7, 2017 | past |
|
| | Does a free swap turn a stack into a traditional register set? (2005) (cr.yp.to) |
| 2 points by Tomte on Feb 13, 2017 | past |
|
| | SafeCurves – Choosing safe curves for elliptic-curve cryptography (cr.yp.to) |
| 1 point by spaceboy on Jan 24, 2017 | past |
|
| | A Plea for Lean Software (1995) [pdf] (cr.yp.to) |
| 2 points by mpweiher on Jan 19, 2017 | past |
|
| | Netstrings (1997) (cr.yp.to) |
| 1 point by panic on Dec 22, 2016 | past |
|
| | Some challenges in post-quantum standardization (cr.yp.to) |
| 2 points by zx2c4 on Nov 18, 2016 | past |
|
| | Some challenges in post-quantum standardization (cr.yp.to) |
| 3 points by kkl on Oct 31, 2016 | past |
|
| | TweetNaCl – A crypto library in 100 tweets (cr.yp.to) |
| 7 points by zerognowl on Oct 17, 2016 | past | 2 comments |
|
| | Two file descriptors for sockets (cr.yp.to) |
| 2 points by life_is_short on Oct 15, 2016 | past |
|
| | The death of optimizing compilers [pdf] (cr.yp.to) |
| 2 points by deafcalculus on Oct 11, 2016 | past | 1 comment |
|
| | Failures in NIST’s ECC standards [pdf] (cr.yp.to) |
| 66 points by lisper on Oct 7, 2016 | past | 18 comments |
|
| | How to design an elliptic-curve signature system (2014) (cr.yp.to) |
| 6 points by doomrobo on Aug 14, 2016 | past |
|
| | The packages hierarchy (cr.yp.to) |
| 1 point by wbl on Aug 6, 2016 | past |
|
| | Salsa20 design [pdf] (cr.yp.to) |
| 58 points by lucb1e on Aug 5, 2016 | past | 22 comments |
|
| | Does a free swap turn a stack into a traditional register set? (2005) (cr.yp.to) |
| 2 points by Tomte on June 30, 2016 | past |
|
|
| More |