Active
Recent
Comments
Search
Login
Login
cr.yp.to: 15 stories from 12 submitters
2
Multi-ciphertext security degradation for lattices
pdf
cryptography
cr.yp.to
via
wizardishungry
10 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
A discretization attack
☶
pdf
security
cr.yp.to
via
knl
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
MinimaLT: Minimal-latency Networking Through BetterSecurity
pdf
networking
cr.yp.to
via
awn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Rebuilding target files when source files have changed
programming
cr.yp.to
via
geocar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
10
Boring crypto
pdf
cryptography
security
cr.yp.to
via
mikejsavage
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
6
Cryptography worst practices - Daniel J. Bernstein (2012)
pdf
cryptography
networking
security
cr.yp.to
via
mjturner
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Some thoughts on security after ten years of qmail 1.0 (2007)
☶
pdf
security
cr.yp.to
via
geocar
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
The first 10 years of Curve25519
pdf
security
cr.yp.to
via
fcambus
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Failures in NIST’s ECC standards
pdf
security
cr.yp.to
via
noelle
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
The IPv6 mess (2003)
devops
ipv6
networking
cr.yp.to
via
friendlysock
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
10
The death of optimizing compilers
☶
audio
pdf
assembly
compilers
culture
security
cr.yp.to
via
cnst
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
31
The death of optimizing compilers
pdf
compilers
cr.yp.to
via
fcambus
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
3
How the AXFR protocol works (2003)
networking
cr.yp.to
via
cnst
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Some thoughts on security after ten years of qmail 1.0 (2007)
pdf
security
cr.yp.to
via
pushcx
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Making sure software stays insecure
pdf
security
cr.yp.to
via
inactive-user
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1