crypto
Home
Recent
Comments
Search
Login
Stories
tagged
as
crypto
– Cryptography
8
Understanding the Security of Cryptographic Hash Functions
crypto
jeffcarp.com
authored by
jeffcarp
4 months ago
|
cached
|
6 comments
6
2
Prior Art about Encrypted Applicative Protocols?
☶
ask
crypto
networking
programming
authored by
Shamar
4 months ago
|
10 comments
10
4
Decentralizing Public Key Infrastructures with ClaimChains
☶
pdf
compsci
crypto
arxiv.org
via
phaer
4 months ago
|
cached
|
no comments
0
12
Cryptographic Right Answers
crypto
latacora.singles
via
calvin
4 months ago
|
cached
|
1 comment
1
0
Buzzword Convergence: Making Sense of Quantum Neural Blockchain AI—Stephen Wolfram Blog
☶
ai
crypto
cryptocurrencies
math
blog.stephenwolfram.com
via
miles
4 months ago
|
cached
|
no comments
0
7
Measuring elliptic curve implementations in the wild
☶
pdf
crypto
security
eprint.iacr.org
via
mjn
5 months ago
|
cached
|
no comments
0
15
The cypherpunk revolution
crypto
historical
projects.csmonitor.com
via
mulander
5 months ago
|
cached
|
no comments
0
3
Open PhD & PostDoc positions in Security and Formal Analysis
☶
crypto
job
security
cascremers.com
via
mpdehnel
5 months ago
|
cached
|
no comments
0
12
No ad hoc parser in NeoPG
c++
crypto
formalmethods
security
neopg.io
via
seu
5 months ago
|
cached
|
no comments
0
7
Telegram Loses Bid to Block Russia From Encryption Keys
☶
crypto
security
bloomberg.com
via
oz
5 months ago
|
cached
|
4 comments
4
6
The long road to getrandom() in glibc (2017)
crypto
linux
lwn.net
via
xorhash
5 months ago
|
cached
|
no comments
0
16
Wireguard on PicoLisp
crypto
lisp
bitbucket.org
authored by
tankfeeder
5 months ago
|
cached
|
no comments
0
43
ACME v2 and Wildcard Certificate Support is Live
crypto
community.letsencrypt.org
via
j11g
5 months ago
|
cached
|
4 comments
4
5
yescrypt 1.0.0 - modern KDF and password hashing scheme
crypto
release
openwall.com
via
mpasternacki
5 months ago
|
cached
|
3 comments
3
10
Crypto Zealots
crypto
privacy
potaroo.net
via
zpojqwfejwfhiunz
5 months ago
|
cached
|
2 comments
2
18
Paseto is a Secure Alternative to the JOSE Standards (JWT, etc.)
crypto
php
security
web
paragonie.com
authored by
sarciszewski
5 months ago
|
cached
|
20 comments
20
21
Keybase is now supported by the Stellar Development Foundation
☶
crypto
cryptocurrencies
keybase.io
via
stevejalim
5 months ago
|
cached
|
4 comments
4
14
Encrypted cloud backups with Duplicity and GPG
crypto
linux
security
roussos.cc
authored by
comzeradd
5 months ago
|
cached
|
15 comments
15
8
Keep the Bombe on the Bletchley Park Estate
crypto
historical
crowdfunder.co.uk
via
grahamc
6 months ago
|
cached
|
no comments
0
4
Assembling with your own hands a demonstrably-correct set of routines for multi-precision arithmetic
crypto
programming
loper-os.org
via
akkartik
6 months ago
|
cached
|
2 comments
2
3
Wire's Rust implementation of the Double Ratchet Algorithm
crypto
rust
github.com
via
jstoja
6 months ago
|
cached
|
no comments
0
23
Authentication vulnerability in most recent 5G drafts, found by formal methods
crypto
formalmethods
mobile
security
cs.ox.ac.uk
authored by
mpdehnel
6 months ago
|
cached
|
no comments
0
6
The Noise protocol framework - Trevor Perrin - Real World Crypto 2018
video
crypto
security
youtube.com
via
dbremner
6 months ago
|
cached
|
no comments
0
11
Password Protecting Certain Dropbox/Google Drive Files
crypto
security
medium.com
authored by
mikob
6 months ago
|
cached
|
7 comments
7
5
Drive-by Key-Extraction Cache Attacks from Portable Code
pdf
crypto
eprint.iacr.org
via
lainon
6 months ago
|
cached
|
no comments
0
<< Page 3
|
Page 5 >>