Home
Recent
Comments
Search
Login
Search
Search:
Stories
Comments
Order By:
Relevance
Newest
Points
30 results for "domain:cr.yp.to"
16
djbsort: a new software library for sorting arrays of signed 32 bit integers
c
release
sorting.cr.yp.to
via
pushcx
1 month ago
|
cached
|
7 comments
7
12
Reconstructing ROCA
crypto
blog.cr.yp.to
via
crazyloglad
10 months ago
|
cached
|
no comments
0
10
Boring crypto
pdf
crypto
security
cr.yp.to
via
mikejsavage
11 months ago
|
cached
|
3 comments
3
10
NTRU Prime post-quantum cryptography and some amazing C code from DJB et al
c
security
ntruprime.cr.yp.to
via
vyodaiken
1 year ago
|
cached
|
no comments
0
6
DJB: Break a dozen secret keys, get a million more for free [2015]
crypto
security
blog.cr.yp.to
via
ThisIs_MyName
1 year ago
|
cached
|
no comments
0
6
Cryptography worst practices - Daniel J. Bernstein (2012)
pdf
crypto
networking
security
cr.yp.to
via
mjturner
1 year ago
|
cached
|
no comments
0
3
Security fraud in Europe's "Quantum Manifesto"
☶
finance
person
security
blog.cr.yp.to
via
cnst
1 year ago
|
cached
|
no comments
0
21
The death of due process
culture
law
philosophy
blog.cr.yp.to
via
rain1
2 years ago
|
cached
|
19 comments
19
7
Some thoughts on security after ten years of qmail 1.0 (2007)
☶
pdf
security
cr.yp.to
via
geocar
2 years ago
|
cached
|
no comments
0
14
DJB: Is the security of quantum cryptography guaranteed by the laws of physics?
pdf
security
sidechannels.cr.yp.to
via
sustrik
2 years ago
|
cached
|
1 comment
1
9
Thomas Jefferson and Apple versus the FBI
law
blog.cr.yp.to
via
jcs
2 years ago
|
cached
|
no comments
0
8
The first 10 years of Curve25519
pdf
security
cr.yp.to
via
fcambus
2 years ago
|
cached
|
no comments
0
2
Failures in NIST’s ECC standards
pdf
security
cr.yp.to
via
noelle
2 years ago
|
cached
|
no comments
0
11
Break a dozen secret keys, get a million more for free
security
blog.cr.yp.to
via
kyle
2 years ago
|
cached
|
1 comment
1
7
The IPv6 mess (2003)
devops
ipv6
networking
cr.yp.to
via
friendlysock
3 years ago
|
cached
|
3 comments
3
6
cr.yp.to: blog
compsci
math
person
security
blog.cr.yp.to
via
cnst
3 years ago
|
cached
|
2 comments
2
9
The death of optimizing compilers
☶
audio
pdf
assembly
compilers
culture
security
cr.yp.to
via
cnst
3 years ago
|
cached
|
no comments
0
31
The death of optimizing compilers
pdf
compilers
cr.yp.to
via
fcambus
3 years ago
|
cached
|
11 comments
11
3
How the AXFR protocol works (2003)
networking
cr.yp.to
via
cnst
3 years ago
|
cached
|
no comments
0
7
Some thoughts on security after ten years of qmail 1.0 (2007)
pdf
security
cr.yp.to
via
pushcx
3 years ago
|
cached
|
1 comment
1
Page:
1
2