crypto
Home
Recent
Comments
Search
Login
Stories
tagged
as
crypto
– Cryptography
5
Factoring the Noise protocol matrix
crypto
latacora.singles
via
pushcx
1 month ago
|
cached
|
no comments
0
18
Things that use Ed25519
crypto
security
ianix.com
via
mikalv
1 month ago
|
cached
|
10 comments
10
28
Are SKS keyservers safe? Do we need them?
crypto
security
medium.com
authored by
yakamo
1 month ago
|
cached
|
7 comments
7
27
Are PGP Key-servers Breaking the Law under the GDPR?
crypto
medium.com
authored by
yakamo
1 month ago
|
cached
|
32 comments
32
3
Public Accountability vs. Secret Laws: Can They Coexist?
crypto
eprint.iacr.org
via
lainon
1 month ago
|
cached
|
no comments
0
37
Why I've Retired My PGP Keys and What's Replaced It (2017)
crypto
security
nullprogram.com
via
czocher
1 month ago
|
cached
|
24 comments
24
11
Introducing Elliptic Curves
crypto
security
jeremykun.com
via
signal-11
1 month ago
|
cached
|
3 comments
3
1
Wire and post-quantum resistance
crypto
blog.wire.com
via
fkr
1 month ago
|
cached
|
no comments
0
1
Trustica beginner introduction to elliptic curve cryptography
☶
crypto
math
trustica.cz
via
rain1
1 month ago
|
cached
|
no comments
0
3
The 5 unique coordinates you'll need to watch out for in Curve25519
crypto
math
crypto.stackexchange.com
via
rain1
1 month ago
|
cached
|
no comments
0
3
reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption
crypto
networking
security
arxiv.org
via
trn
1 month ago
|
cached
|
no comments
0
5
A tool for benchmarking fast C functions with less noise
crypto
performance
programming
moderncrypto.org
via
rain1
1 month ago
|
cached
|
2 comments
2
16
A Brief Look At North Korean Cryptography
crypto
blog.kryptoslogic.com
via
calvin
1 month ago
|
cached
|
3 comments
3
2
An introduction to randomness extractors
pdf
crypto
math
cs.haifa.ac.il
via
rain1
1 month ago
|
cached
|
no comments
0
2
The XEdDSA and VXEdDSA Signature Schemes
crypto
signal.org
via
rain1
1 month ago
|
cached
|
no comments
0
6
Efail: HTML Mails have no Security Concept and are to blame
crypto
security
blog.hboeck.de
authored by
hanno
2 months ago
|
cached
|
3 comments
3
2
Monocypher: Critical failure of EdDSA checking
crypto
monocypher.org
via
rain1
2 months ago
|
cached
|
1 comment
1
1
Wi-Fi Alliance® introduces Wi-Fi CERTIFIED WPA3™ security
crypto
networking
release
security
wi-fi.org
via
danso
2 months ago
|
cached
|
3 comments
3
3
Project Wcheproof: Test for implementation pitfalls in crypto code
crypto
github.com
via
rain1
2 months ago
|
cached
|
no comments
0
2
Exploring .NET Core platform intrinsics: Part 1 - Accelerating SHA-256 on ARMv8
crypto
dotnet
mijailovic.net
via
calvin
2 months ago
|
cached
|
no comments
0
16
Signing CryptPad - Experiments with making a webapp secure despite the server
crypto
security
web
blog.cryptpad.fr
authored by
cjd
2 months ago
|
cached
|
7 comments
7
3
SigSpoof: Spoofing signatures in GnuPG, Enigmail, GPGTools and python-gnupg (CVE-2018-12020) – NeoPG
crypto
security
neopg.io
via
hanno
2 months ago
|
cached
|
no comments
0
6
Leaf-Node weakness in Bitcoin Merkle Tree Design
crypto
cryptocurrencies
security
bitslog.wordpress.com
via
calvin
2 months ago
|
cached
|
no comments
0
11
libcsi - Crypto Simplified Interface
api
crypto
openbsd
undeadly.org
via
calvin
2 months ago
|
cached
|
8 comments
8
6
Linux Cryptography — crypto: Speck support
☶
crypto
linux
spinics.net
via
pcy
2 months ago
|
cached
|
no comments
0
<< Page 1
|
Page 3 >>