crypto
Home
Recent
Comments
Search
Login
Stories
tagged
as
crypto
– Cryptography
6
Linux Cryptography — crypto: Speck support
☶
crypto
linux
spinics.net
via
pcy
2 months ago
|
cached
|
no comments
0
2
Improved Authentication for Email Encryption and Security (2016)
crypto
security
protonmail.com
via
Couto
2 months ago
|
cached
|
no comments
0
24
Do Not Use sha256crypt / sha512crypt - They're Dangerous
crypto
freebsd
linux
pthree.org
via
farrokhi
3 months ago
|
cached
|
3 comments
3
8
efail: Outdated Crypto Standards are to blame
crypto
security
blog.hboeck.de
authored by
hanno
3 months ago
|
cached
|
no comments
0
6
Noise Explorer: Design and Explore Noise Security Protocol Handshake Patterns
crypto
formalmethods
security
noiseexplorer.com
via
mpdehnel
3 months ago
|
cached
|
no comments
0
15
Efail: A Postmortem
crypto
culture
privacy
security
medium.com
via
da
3 months ago
|
cached
|
5 comments
5
1
Interview with Professor Vincent Rijmen: Encryption Innovator at KUL
crypto
person
thevoiceleuven.be
via
calvin
3 months ago
|
cached
|
3 comments
3
5
The Alice and Bob After Dinner Speech
crypto
historical
satire
urbigenous.net
via
friendlysock
3 months ago
|
cached
|
no comments
0
22
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels
☶
crypto
security
efail.de
via
Shamar
3 months ago
|
cached
|
30 comments
30
6
Specific Problems with Other RNGs
crypto
pcg-random.org
via
calvin
3 months ago
|
cached
|
1 comment
1
32
Two Weeks on Matrix/Riot Short Review
☶
android
crypto
mobile
web
authored by
apy
3 months ago
|
19 comments
19
7
Triple Entry Accounting
crypto
historical
iang.org
via
adsouza
3 months ago
|
cached
|
no comments
0
7
xoshiro/xoroshiro generators and the PRNG shootout
crypto
xoshiro.di.unimi.it
via
calvin
3 months ago
|
cached
|
1 comment
1
2
Call for grant proposals from the Zcash Foundation; $250,000 total budget
☶
crypto
cryptocurrencies
z.cash.foundation
via
sonya
3 months ago
|
cached
|
no comments
0
10
Why you should verify the tokens you own: A deep dive into two vulnerable ERC20 contracts
crypto
cryptocurrencies
security
cryptojobslist.com
authored by
ksaitor
4 months ago
|
cached
|
7 comments
7
9
Hardware accelerated AES/HMAC-SHA on octeons
crypto
openbsd
undeadly.org
via
calvin
4 months ago
|
cached
|
no comments
0
6
Shipping formally verified crypto code
crypto
formalmethods
franziskuskiefer.de
via
freddyb
4 months ago
|
cached
|
no comments
0
2
ImperialViolet - Post-quantum confidentiality for TLS
crypto
imperialviolet.org
via
j11g
4 months ago
|
cached
|
no comments
0
7
Encoding data in dubstep drops
audio
crypto
blog.benjojo.co.uk
via
calvin
4 months ago
|
cached
|
no comments
0
9
Encrypted Gopher
crypto
alexschroeder.ch
via
enkiv2
4 months ago
|
cached
|
8 comments
8
16
Multiple vulnerabilities in SecureRandom(), numerous cryptocurrency products affected
crypto
cryptocurrencies
javascript
lists.linuxfoundation.org
via
David_Gerard
4 months ago
|
cached
|
3 comments
3
1
A Graduate Course in Applied Cryptography
crypto
education
crypto.stanford.edu
via
quobit
4 months ago
|
cached
|
no comments
0
6
FontCode: Embedding Information in Text Documents using Glyph Perturbation
pdf
ai
crypto
security
cs.columbia.edu
via
Pushups
4 months ago
|
cached
|
1 comment
1
15
Helvetica Is Now An Encryption Device
ai
crypto
science
security
fastcodesign.com
via
jkirchartz
4 months ago
|
cached
|
6 comments
6
4
How Learning GPG Is Like Learning Git
crypto
education
russellparker.me
authored by
russell
4 months ago
|
cached
|
no comments
0
<< Page 2
|
Page 4 >>