Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
SPHINCS: practical stateless hash-based signatures (cr.yp.to)
1 point by frrp on March 25, 2015 | past
Some thoughts on security after ten years of qmail 1.0 (2007) [pdf] (cr.yp.to)
27 points by tosh on March 23, 2015 | past | 6 comments
The Death of Optimizing Compilers (cr.yp.to)
49 points by mpweiher on March 14, 2015 | past | 49 comments
Follow-You Printing (cr.yp.to)
9 points by wglb on Feb 19, 2015 | past | 1 comment
Follow-You Printing (cr.yp.to)
7 points by wglb on Feb 18, 2015 | past | 1 comment
Crypto and the United States Constitution [pdf] (cr.yp.to)
1 point by wslh on Feb 18, 2015 | past
A new proof that 83 is prime (2003) [pdf] (cr.yp.to)
3 points by linc01n on Feb 16, 2015 | past | 1 comment
UTC, TAI, and Unix time (1997) (cr.yp.to)
27 points by marcopolis on Feb 8, 2015 | past | 5 comments
Curve25519: new Diffie-Hellman speed records (2006) [pdf] (cr.yp.to)
13 points by kushti on Jan 26, 2015 | past
TweetNaCl: a crypto library in 100 tweets (cr.yp.to)
1 point by lisper on Jan 12, 2015 | past
ECCHacks: A gentle introduction to elliptic-curve cryptography (cr.yp.to)
2 points by dochtman on Dec 27, 2014 | past
Batch Numeric Field Sieve [pdf] (cr.yp.to)
17 points by sigil on Nov 9, 2014 | past | 1 comment
Making sure crypto remains insecure [pdf] (cr.yp.to)
439 points by zorked on Oct 19, 2014 | past | 171 comments
SPHINCS: practical stateless hash-based signatures (cr.yp.to)
1 point by zdw on Oct 12, 2014 | past
[dupe] SPHINCS: practical stateless hash-based signatures (cr.yp.to)
3 points by lukashed on Oct 9, 2014 | past
SPHINCS: practical stateless hash-based signatures (cr.yp.to)
32 points by mace on Oct 7, 2014 | past | 11 comments
MinimaLT: Minimal-latency Networking Through Better Security (2013) [pdf] (cr.yp.to)
24 points by _urga on Sept 19, 2014 | past | 5 comments
Niklaus Wirth: A Plea for Lean Software (1995) [pdf] (cr.yp.to)
38 points by pmarin on Sept 11, 2014 | past | 12 comments
How to manipulate curve standards: a white paper for the black hat [pdf] (cr.yp.to)
3 points by jvdh on July 23, 2014 | past
Making sure software stays insecure [pdf] (cr.yp.to)
94 points by thristian on July 12, 2014 | past | 39 comments
The Saber cluster (cr.yp.to)
1 point by deepblueocean on June 3, 2014 | past
BADA55: safe curves for elliptic-curve cryptography (cr.yp.to)
94 points by mrsaint on May 18, 2014 | past | 15 comments
Some small suggestions for the Intel instruction set (cr.yp.to)
138 points by zdw on May 18, 2014 | past | 37 comments
Cdb: a fast, reliable, simple package for creating, reading constant databases (cr.yp.to)
91 points by networked on May 10, 2014 | past | 41 comments
Some thoughts on security after 10 years of qmail 1.0 (2007) (cr.yp.to)
3 points by epsylon on May 4, 2014 | past
Extreme sandboxing [pdf, 2005] (cr.yp.to)
1 point by lvevjo on April 18, 2014 | past
MinimaLT: Minimal-latency Networking Through Better Security [pdf] (cr.yp.to)
2 points by Jtsummers on April 14, 2014 | past
[non-Google] "NaCl is also much faster than OpenSSL" (cr.yp.to)
2 points by uuid_to_string on April 13, 2014 | past
Some thoughts on security after ten years of qmail 1.0 (2007) (cr.yp.to)
2 points by silenteh on April 13, 2014 | past
NIST's cryptographic standardization process (cr.yp.to)
32 points by zdw on April 11, 2014 | past | 2 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: