crypto
Home
Recent
Comments
Search
Login
Stories
tagged
as
crypto
– Cryptography
8
Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis
pdf
crypto
cryptocurrencies
privacy
arxiv.org
via
asthasr
7 months ago
|
cached
|
no comments
0
3
ElectronicColoringBook by doegox
crypto
doegox.github.io
via
bowyakka
7 months ago
|
cached
|
no comments
0
2
How to Reveal the Secrets of an Obscure White-Box Implementation
pdf
crypto
eprint.iacr.org
via
lainon
7 months ago
|
cached
|
no comments
0
2
RANDU: The case of the bad RNG
crypto
csgillespie.wordpress.com
via
calvin
7 months ago
|
cached
|
no comments
0
4
Cracking Codes with Python
crypto
education
programming
python
inventwithpython.com
via
nanxiao
7 months ago
|
cached
|
no comments
0
1
New Computational Proof Results of WireGuard Protocol from Dowling and Paterson
☶
crypto
formalmethods
linux
networking
lists.zx2c4.com
via
zx2c4
7 months ago
|
cached
|
no comments
0
26
Introducing the first ever shitpost-based RNG
crypto
security
blog.0day.rocks
authored by
x0rz
7 months ago
|
cached
|
5 comments
5
3
Toy Code: Hand-crafting a good hash function
crypto
programming
calypsosfarewell.blogspot.com
via
calvin
7 months ago
|
cached
|
2 comments
2
3
Bulletproofs: Short Proofs for Confidential Transactions
crypto
cryptocurrencies
crypto.stanford.edu
via
sanxiyn
7 months ago
|
cached
|
no comments
0
2
Important: What you need to know about TLS-SNI validation issues
☶
crypto
community.letsencrypt.org
via
evaryont
7 months ago
|
cached
|
no comments
0
21
Formally Verified Cryptographic Primitive Implementations in WireGuard
☶
crypto
formalmethods
linux
networking
lists.zx2c4.com
authored by
zx2c4
7 months ago
|
cached
|
12 comments
12
3
How I exploited ACME TLS-SNI-01 issuing Let’s Encrypt SSL-certs for any domain using shared hosting
crypto
security
web
labs.detectify.com
via
juef
7 months ago
|
cached
|
no comments
0
16
LetsEncrypt: Update Regarding ACME TLS-SNI and Shared Hosting Infrastructure
crypto
security
web
community.letsencrypt.org
via
freddyb
7 months ago
|
cached
|
no comments
0
3
Signal partners with Microsoft to bring end-to-end encryption to Skype
crypto
culture
privacy
signal.org
via
rama_dan
7 months ago
|
cached
|
4 comments
4
2
Recommendation for the Entropy Sources Used for Random Bit Generation
crypto
csrc.nist.gov
via
trn
7 months ago
|
cached
|
no comments
0
10
Attack of the Week: Group Messaging in WhatsApp and Signal
crypto
security
blog.cryptographyengineering.c
om
via
freddyb
7 months ago
|
cached
|
5 comments
5
7
Secure Remote Attestation
☶
pdf
crypto
eprint.iacr.org
via
pushcx
7 months ago
|
cached
|
no comments
0
12
Crypto for Kids (A Book that is a Labyrinth)
crypto
education
games
github.com
authored by
sustrik
7 months ago
|
cached
|
4 comments
4
30
Private keys in software from Blizzard, Electronic Arts, Microsoft, and the German Federal Bar
crypto
security
feistyduck.com
authored by
hanno
8 months ago
|
cached
|
no comments
0
10
Random with care
crypto
math
eev.ee
via
calvin
8 months ago
|
cached
|
1 comment
1
6
Crypto for Kids: Messenger's Story
crypto
250bpm.com
authored by
sustrik
8 months ago
|
cached
|
no comments
0
2
Application Layer Transport Security
pdf
crypto
scaling
cloud.google.com
via
eest
8 months ago
|
cached
|
no comments
0
43
NSA backdoor discovered in the wild: The strange story of “Extended Random”
☶
crypto
security
blog.cryptographyengineering.c
om
via
robey
8 months ago
|
cached
|
no comments
0
12
Everything you need to know about cryptography in 1 hour (2010)
pdf
slides
crypto
bsdcan.org
via
sgreben
8 months ago
|
cached
|
3 comments
3
9
Round 1 Submissions to NIST Post-Quantum Cryptography Project
crypto
csrc.nist.gov
via
dchest
8 months ago
|
cached
|
1 comment
1
<< Page 4
|
Page 6 >>