Hacker News new | past | comments | ask | show | jobs | submit | from login
Constant-Time Code: The Pessimist Case [pdf] (iacr.org)
91 points by yuedongze 5 days ago | past | 66 comments
Constant-time coding is, or will soon become, infeasible in all generality [pdf] (iacr.org)
1 point by jedisct1 5 days ago | past | discuss
How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org)
2 points by pbrowne011 45 days ago | past
ColliderScript: Covenants in Bitcoin via 160-bit hash collisions (iacr.org)
2 points by noch 49 days ago | past
Approaches to Solving SVP in Lattice Cryptography with Quantum Gravity (iacr.org)
1 point by noam_k 59 days ago | past
CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust (iacr.org)
1 point by EvgeniyZh 59 days ago | past
Knot-based Key Exchange protocol (iacr.org)
1 point by RadixDLT 87 days ago | past
Chosen-Prefix Collisions on AES-Like Hashing (iacr.org)
2 points by pentestercrab 3 months ago | past
Quantum One-Shot Signatures (iacr.org)
2 points by fbrusch 5 months ago | past
PQ-HPKE: Post-Quantum Hybrid Public Key Encryption (iacr.org)
1 point by teleforce 5 months ago | past
Pulsar: Secure Steganography for Diffusion Models (iacr.org)
41 points by aliventer 5 months ago | past | 3 comments
Provable Security of Linux-DRBG in the Seedless Robustness Model [pdf] (iacr.org)
43 points by zx2c4 5 months ago | past | 3 comments
Efficient Secret Sharing for Large-Scale Applications [pdf] (iacr.org)
5 points by hundredwatt 6 months ago | past
SoK: The Engineer's Guide to Post-Quantum Cryptography for Embedded Devices (iacr.org)
2 points by simonpure 6 months ago | past
RSA-Based Dynamic Accumulator Without Hashing into Primes (iacr.org)
2 points by simonpure 6 months ago | past
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM (iacr.org)
101 points by belter 6 months ago | past | 48 comments
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM (iacr.org)
1 point by speckx 6 months ago | past
Shufflecake: Plausible deniability for hidden filesystems on Linux (2023) (iacr.org)
66 points by simonpure 6 months ago | past | 23 comments
MIFARE Classic: exposing the static encrypted nonce variant [pdf] (iacr.org)
250 points by dave_universetf 6 months ago | past | 95 comments
The Impact of Time on DNS Security (2019) [pdf] (iacr.org)
3 points by indigodaddy 7 months ago | past
Safe curves for Elliptic Curve Cryptography [pdf] (iacr.org)
84 points by sebgan 7 months ago | past | 70 comments
A Formal Treatment of End-to-End Encrypted Cloud Storage [pdf] (iacr.org)
2 points by belter 7 months ago | past
Collision Attacks on Galois/Counter Mode (GCM) (iacr.org)
2 points by ementally 7 months ago | past
CHVote Protocol Specification (iacr.org)
1 point by simonpure 8 months ago | past
The impact of post-quantum TLS 1.3 on Time-To-Last-Byte of realworld connections (iacr.org)
1 point by belter 8 months ago | past
Asynchronous Consensus Without Trusted Setup or Public-Key Cryptography (iacr.org)
157 points by simonpure 8 months ago | past | 46 comments
Zombie: Middleboxes that Don't Snoop [pdf] (iacr.org)
1 point by skilled 8 months ago | past
Bruisable Onions: Anonymous Communication in the Asynchronous Model (iacr.org)
1 point by simonpure 9 months ago | past
Concurrently Secure Blind Schnorr Signatures (iacr.org)
1 point by janandonly 9 months ago | past
Knot-based Key Exchange protocol [pdf] (iacr.org)
1 point by g0xA52A2A 9 months ago | past

Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: