Active
Recent
Comments
Search
Login
Login
loup-vaillant.fr: 22 stories from 10 submitters
27
Fixing the TPM: Hardware Security Modules Done Right
cryptography
security
loup-vaillant.fr
authored by
Loup-Vaillant
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
48 comments
48
27
The Physics of Readability
programming
loup-vaillant.fr
authored by
Loup-Vaillant
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
18 comments
18
33
The repeated deaths of OOP
programming
loup-vaillant.fr
via
quad
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
33 comments
33
48
Cryptography is not Magic
cryptography
programming
loup-vaillant.fr
authored by
Loup-Vaillant
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
17 comments
17
23
Surrounded by Elligators: Implementing Crypto With Nothing to Compare to
cryptography
programming
loup-vaillant.fr
authored by
Loup-Vaillant
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
22
Cofactor Explained: Clearing Elliptic Curves' dirty little secret
cryptography
math
loup-vaillant.fr
authored by
Loup-Vaillant
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
42
128 Bits of Security and 128 Bits of Security: Know the Difference
cryptography
security
loup-vaillant.fr
authored by
Loup-Vaillant
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
12
XCKDF: X25519 Chacha20 Key Derivation Function
☶
cryptography
loup-vaillant.fr
authored by
Loup-Vaillant
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
21
Key derivation with Chacha20 (a stream cipher)
cryptography
loup-vaillant.fr
authored by
Loup-Vaillant
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
14
Fast Multiplication with Slow Additions
cryptography
math
programming
loup-vaillant.fr
via
calvin
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
What is Left to do After your Open Source Project is Done
practices
loup-vaillant.fr
via
xorhash
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
10 comments
10
8
Earley Parsing Explained
plt
loup-vaillant.fr
via
mattgreenrocks
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
37
How I implemented my own crypto
c
cryptography
loup-vaillant.fr
via
evadot
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
17 comments
17
12
Monocypher 1.0 - a single .c/.h crypto library
☶
c
cryptography
release
loup-vaillant.fr
via
mikejsavage
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
1
The Programmer's Ring
culture
loup-vaillant.fr
via
calvin
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
9
Monocypher - a small, secure, auditable, easy to use crypto library
cryptography
loup-vaillant.fr
via
av
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
6
The design of Poly1305
cryptography
loup-vaillant.fr
via
calvin
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
18
The design of Chacha20
cryptography
programming
loup-vaillant.fr
via
calvin
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
12
Rolling Your Own Crypto
cryptography
loup-vaillant.fr
via
calvin
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
19
What is good code?
☶
practices
programming
loup-vaillant.fr
via
tizoc
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
1
How to avoid the assignment statement (2010)
practices
programming
loup-vaillant.fr
via
pushcx
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Assignment Statement Considered Harmful
programming
loup-vaillant.fr
via
pushcx
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4