crypto
Home
Recent
Comments
Search
Login
Stories
tagged
as
crypto
– Cryptography
2
Random number generators for massively-parallel, simulations on GPU (2012)
pdf
crypto
programming
arxiv.org
via
nickpsecurity
12 months ago
|
cached
|
no comments
0
2
Parallel White Noise Generation on a GPU via Cryptographic Hash
slides
crypto
graphics
math
slideserve.com
via
friendlysock
12 months ago
|
cached
|
4 comments
4
15
In Search of a Secure Time Source
crypto
security
blog.hboeck.de
authored by
hanno
12 months ago
|
cached
|
9 comments
9
1
320 Million Hashes Exposed
crypto
security
cynosureprime.blogspot.com
via
stsp
1 year ago
|
cached
|
no comments
0
17
Why Isn’t Telegram End-to-End Encrypted by Default?
crypto
security
telegra.ph
via
ngrilly
1 year ago
|
cached
|
13 comments
13
5
What Colour are your bits?
crypto
law
philosophy
privacy
ansuz.sooke.bc.ca
via
yumaikas
1 year ago
|
cached
|
no comments
0
15
The Double Ratchet Algorithm
pdf
crypto
whispersystems.org
via
asthasr
1 year ago
|
cached
|
1 comment
1
2
The Cryptographic Doom Principle
crypto
security
moxie.org
via
yumaikas
1 year ago
|
cached
|
no comments
0
5
RSA key strength and math
crypto
math
0xcc.re
authored by
mikalv
1 year ago
|
cached
|
5 comments
5
3
London Crypto Day - 22nd September 2017
crypto
event
security
londoncryptoday.wordpress.com
via
sevan
1 year ago
|
cached
|
no comments
0
1
Keys Under Doormats
video
crypto
youtube.com
via
fcbsd
1 year ago
|
cached
|
no comments
0
5
Visualizing the Heart of Some PRNGs
crypto
visualization
pcg-random.org
via
quobit
1 year ago
|
cached
|
2 comments
2
5
Secrets and LIE-abilities: The State of Modern Secret Management (2017)
crypto
devops
practices
security
medium.com
via
Thai
1 year ago
|
cached
|
no comments
0
5
Rolling your Own Blockchain in Haskell by Michael Burge
crypto
haskell
michaelburge.us
via
romanzolotarev
1 year ago
|
cached
|
no comments
0
7
How to Generate a Sequence of Unique Random Integers
crypto
math
programming
preshing.com
via
rain1
1 year ago
|
cached
|
2 comments
2
7
(n+1)sec is an end-to-end secure, synchronous, multi-party messaging protocol
crypto
security
github.com
via
fcbsd
1 year ago
|
cached
|
no comments
0
3
The Edited Truth
pdf
crypto
eprint.iacr.org
via
trn
1 year ago
|
cached
|
no comments
0
7
stealth/opmsg: A gpg alternative
crypto
privacy
release
security
github.com
via
trn
1 year ago
|
cached
|
1 comment
1
4
A Systematic Analysis of the Juniper Dual EC Incident
pdf
crypto
practices
reversing
security
cs.uic.edu
via
trn
1 year ago
|
cached
|
no comments
0
13
DEF CON 25 - Elie Bursztein - How We Created the First SHA 1 Collision
video
crypto
youtube.com
via
rain1
1 year ago
|
cached
|
1 comment
1
3
Ethereum Scam Database
crypto
etherscamdb.info
via
pgl
1 year ago
|
cached
|
1 comment
1
37
How I implemented my own crypto
c
crypto
loup-vaillant.fr
via
evadot
1 year ago
|
cached
|
17 comments
17
2
Confidential Transactions from Basic Principles
crypto
cryptoservices.github.io
via
pushcx
1 year ago
|
cached
|
no comments
0
5
Certificate Transparency: Hacking web applications before they are installed
crypto
security
web
golem.de
authored by
hanno
1 year ago
|
cached
|
2 comments
2
1
building lattice reduction (LLL) intuition
crypto
python
visualization
kel.bz
via
pushcx
1 year ago
|
cached
|
no comments
0
<< Page 7
|
Page 9 >>