Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
Loup-Vaillant
.
27
Fixing the TPM: Hardware Security Modules Done Right
cryptography
security
loup-vaillant.fr
authored by
Loup-Vaillant
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
48 comments
48
27
The Physics of Readability
programming
loup-vaillant.fr
authored by
Loup-Vaillant
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
18 comments
18
20
Elligator: Hiding cryptographic key exchange as random noise
☶
cryptography
elligator.org
authored by
Loup-Vaillant
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
48
Cryptography is not Magic
cryptography
programming
loup-vaillant.fr
authored by
Loup-Vaillant
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
17 comments
17
38
The Monocypher crypto library now has been audited
☶
cryptography
monocypher.org
authored by
Loup-Vaillant
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
24 comments
24
23
Surrounded by Elligators: Implementing Crypto With Nothing to Compare to
cryptography
programming
loup-vaillant.fr
authored by
Loup-Vaillant
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
22
Cofactor Explained: Clearing Elliptic Curves' dirty little secret
cryptography
math
loup-vaillant.fr
authored by
Loup-Vaillant
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
42
128 Bits of Security and 128 Bits of Security: Know the Difference
cryptography
security
loup-vaillant.fr
authored by
Loup-Vaillant
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
58
Assholes: A Probing Examination
practices
nomachetejuggling.com
via
Loup-Vaillant
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
33 comments
33
12
XCKDF: X25519 Chacha20 Key Derivation Function
☶
cryptography
loup-vaillant.fr
authored by
Loup-Vaillant
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
21
Key derivation with Chacha20 (a stream cipher)
cryptography
loup-vaillant.fr
authored by
Loup-Vaillant
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2