Active
Recent
Comments
Search
Login
Login
blog.cr.yp.to: 17 stories from 11 submitters
19
NSA, NIST, and post-quantum cryptography
cryptography
security
blog.cr.yp.to
via
reezer
3 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
9
Plagiarism as a patent amplifier (post-quantum cryptography)
cryptography
blog.cr.yp.to
via
crazyloglad
6 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
8
Optimizing for the wrong metric, part 1: Microsoft Word
cogsci
practices
blog.cr.yp.to
via
rjc
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
9 comments
9
3
An introduction to vectorization (2019)
performance
blog.cr.yp.to
via
dbremner
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Why EdDSA held up better than ECDSA against Minerva
cryptography
blog.cr.yp.to
via
trousers
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
12
Reconstructing ROCA
cryptography
blog.cr.yp.to
via
crazyloglad
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
DJB: Break a dozen secret keys, get a million more for free [2015]
cryptography
security
blog.cr.yp.to
via
ThisIs_MyName
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Security fraud in Europe's "Quantum Manifesto"
☶
finance
person
security
blog.cr.yp.to
via
cnst
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
21
The death of due process
culture
law
philosophy
blog.cr.yp.to
via
river
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
19 comments
19
9
Thomas Jefferson and Apple versus the FBI
law
blog.cr.yp.to
via
jcs
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
Break a dozen secret keys, get a million more for free
security
blog.cr.yp.to
via
inactive-user
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
cr.yp.to: blog
compsci
math
person
security
blog.cr.yp.to
via
cnst
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
25
Some small suggestions for the Intel instruction set
assembly
security
blog.cr.yp.to
via
inactive-user
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
8
cr.yp.to: NIST's cryptographic standardization process
security
blog.cr.yp.to
via
hdevalence
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
17
How to design an elliptic-curve signature system
security
blog.cr.yp.to
via
inactive-user
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
18
Entropy Attacks!
security
blog.cr.yp.to
via
jcs
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3