Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Constant-Time Code: The Pessimist Case [pdf]
(
iacr.org
)
91 points
by
yuedongze
5 days ago
|
past
|
66 comments
Constant-time coding is, or will soon become, infeasible in all generality [pdf]
(
iacr.org
)
1 point
by
jedisct1
5 days ago
|
past
|
discuss
How to Prove False Statements: Practical Attacks on Fiat-Shamir
(
iacr.org
)
2 points
by
pbrowne011
45 days ago
|
past
ColliderScript: Covenants in Bitcoin via 160-bit hash collisions
(
iacr.org
)
2 points
by
noch
49 days ago
|
past
Approaches to Solving SVP in Lattice Cryptography with Quantum Gravity
(
iacr.org
)
1 point
by
noam_k
59 days ago
|
past
CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust
(
iacr.org
)
1 point
by
EvgeniyZh
59 days ago
|
past
Knot-based Key Exchange protocol
(
iacr.org
)
1 point
by
RadixDLT
87 days ago
|
past
Chosen-Prefix Collisions on AES-Like Hashing
(
iacr.org
)
2 points
by
pentestercrab
3 months ago
|
past
Quantum One-Shot Signatures
(
iacr.org
)
2 points
by
fbrusch
5 months ago
|
past
PQ-HPKE: Post-Quantum Hybrid Public Key Encryption
(
iacr.org
)
1 point
by
teleforce
5 months ago
|
past
Pulsar: Secure Steganography for Diffusion Models
(
iacr.org
)
41 points
by
aliventer
5 months ago
|
past
|
3 comments
Provable Security of Linux-DRBG in the Seedless Robustness Model [pdf]
(
iacr.org
)
43 points
by
zx2c4
5 months ago
|
past
|
3 comments
Efficient Secret Sharing for Large-Scale Applications [pdf]
(
iacr.org
)
5 points
by
hundredwatt
6 months ago
|
past
SoK: The Engineer's Guide to Post-Quantum Cryptography for Embedded Devices
(
iacr.org
)
2 points
by
simonpure
6 months ago
|
past
RSA-Based Dynamic Accumulator Without Hashing into Primes
(
iacr.org
)
2 points
by
simonpure
6 months ago
|
past
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM
(
iacr.org
)
101 points
by
belter
6 months ago
|
past
|
48 comments
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM
(
iacr.org
)
1 point
by
speckx
6 months ago
|
past
Shufflecake: Plausible deniability for hidden filesystems on Linux (2023)
(
iacr.org
)
66 points
by
simonpure
6 months ago
|
past
|
23 comments
MIFARE Classic: exposing the static encrypted nonce variant [pdf]
(
iacr.org
)
250 points
by
dave_universetf
6 months ago
|
past
|
95 comments
The Impact of Time on DNS Security (2019) [pdf]
(
iacr.org
)
3 points
by
indigodaddy
7 months ago
|
past
Safe curves for Elliptic Curve Cryptography [pdf]
(
iacr.org
)
84 points
by
sebgan
7 months ago
|
past
|
70 comments
A Formal Treatment of End-to-End Encrypted Cloud Storage [pdf]
(
iacr.org
)
2 points
by
belter
7 months ago
|
past
Collision Attacks on Galois/Counter Mode (GCM)
(
iacr.org
)
2 points
by
ementally
7 months ago
|
past
CHVote Protocol Specification
(
iacr.org
)
1 point
by
simonpure
8 months ago
|
past
The impact of post-quantum TLS 1.3 on Time-To-Last-Byte of realworld connections
(
iacr.org
)
1 point
by
belter
8 months ago
|
past
Asynchronous Consensus Without Trusted Setup or Public-Key Cryptography
(
iacr.org
)
157 points
by
simonpure
8 months ago
|
past
|
46 comments
Zombie: Middleboxes that Don't Snoop [pdf]
(
iacr.org
)
1 point
by
skilled
8 months ago
|
past
Bruisable Onions: Anonymous Communication in the Asynchronous Model
(
iacr.org
)
1 point
by
simonpure
9 months ago
|
past
Concurrently Secure Blind Schnorr Signatures
(
iacr.org
)
1 point
by
janandonly
9 months ago
|
past
Knot-based Key Exchange protocol [pdf]
(
iacr.org
)
1 point
by
g0xA52A2A
9 months ago
|
past
More
Join us for
AI Startup School
this June 16-17 in San Francisco!
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: