Active
Recent
Comments
Search
Login
Login
blog.cr.yp.to: 22 stories from 15 submitters
28
Clang vs. Clang
compilers
cryptography
security
blog.cr.yp.to
via
squadette
7 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
84 comments
84
1
Bibliography keys
rant
blog.cr.yp.to
via
trousers
9 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
15
Another way to botch the security analysis of Kyber-512
cryptography
blog.cr.yp.to
via
eBPF
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
44
The inability to count correctly
cryptography
security
blog.cr.yp.to
via
iv
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
32 comments
32
6
Turbo Boost
cryptography
security
blog.cr.yp.to
via
ciprian_craciun
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
19
NSA, NIST, and post-quantum cryptography
cryptography
security
blog.cr.yp.to
via
reezer
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
9
Plagiarism as a patent amplifier (post-quantum cryptography)
cryptography
blog.cr.yp.to
via
crazyloglad
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
8
Optimizing for the wrong metric, part 1: Microsoft Word
cogsci
practices
blog.cr.yp.to
via
rjc
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
9 comments
9
3
An introduction to vectorization (2019)
performance
blog.cr.yp.to
via
dbremner
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Why EdDSA held up better than ECDSA against Minerva
cryptography
blog.cr.yp.to
via
trousers
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
12
Reconstructing ROCA
cryptography
blog.cr.yp.to
via
crazyloglad
7 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
DJB: Break a dozen secret keys, get a million more for free [2015]
cryptography
security
blog.cr.yp.to
via
ThisIs_MyName
7 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Security fraud in Europe's "Quantum Manifesto"
☶
finance
person
security
blog.cr.yp.to
via
cnst
8 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
21
The death of due process
culture
law
philosophy
blog.cr.yp.to
via
river
8 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
19 comments
19
9
Thomas Jefferson and Apple versus the FBI
law
blog.cr.yp.to
via
jcs
8 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
Break a dozen secret keys, get a million more for free
security
blog.cr.yp.to
via
inactive-user
9 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
cr.yp.to: blog
compsci
math
person
security
blog.cr.yp.to
via
cnst
9 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
25
Some small suggestions for the Intel instruction set
assembly
security
blog.cr.yp.to
via
inactive-user
10 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
8
cr.yp.to: NIST's cryptographic standardization process
security
blog.cr.yp.to
via
hdevalence
10 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
17
How to design an elliptic-curve signature system
security
blog.cr.yp.to
via
inactive-user
10 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
18
Entropy Attacks!
security
blog.cr.yp.to
via
jcs
11 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3