Home
Recent
Comments
Search
Login
Search
Search:
Stories
Comments
Order By:
Relevance
Newest
Points
30 results for "domain:cr.yp.to"
4
SPHINCS: practical stateless hash-based signatures
security
sphincs.cr.yp.to
via
kyle
3 years ago
|
cached
|
1 comment
1
1
How to manipulate curve standards: a white paper for the black hat
pdf
security
safecurves.cr.yp.to
via
kyle
4 years ago
|
cached
|
no comments
0
7
Making sure software stays insecure
pdf
security
cr.yp.to
via
kyle
4 years ago
|
cached
|
1 comment
1
25
Some small suggestions for the Intel instruction set
assembly
security
blog.cr.yp.to
via
kyle
4 years ago
|
cached
|
1 comment
1
8
cr.yp.to: NIST's cryptographic standardization process
security
blog.cr.yp.to
via
hdevalence
4 years ago
|
cached
|
no comments
0
17
How to design an elliptic-curve signature system
security
blog.cr.yp.to
via
kyle
4 years ago
|
cached
|
5 comments
5
4
Crypto competitions:CAESAR call for submissions
security
competitions.cr.yp.to
via
kyle
4 years ago
|
cached
|
no comments
0
18
Entropy Attacks!
security
blog.cr.yp.to
via
jcs
4 years ago
|
cached
|
3 comments
3
2
SafeCurves: choosing safe curves for elliptic-curve cryptography
security
safecurves.cr.yp.to
via
korchha
4 years ago
|
cached
|
no comments
0
4
Factoring RSA keys from certified smart cards: Coppersmith in the wild
privacy
security
smartfacts.cr.yp.to
via
kyle
4 years ago
|
cached
|
no comments
0
Page:
1
2