Hacker News new | past | comments | ask | show | jobs | submit | from login
Debunking NIST's calculation of the Kyber-512 security level (2023) (cr.yp.to)
59 points by RA2lover 6 days ago | past | 21 comments
McEliece standardization: Looking at what's happening, and analyzing rationales (cr.yp.to)
5 points by 1vuio0pswjnm7 42 days ago | past
The cryptoint library (DJB) [pdf] (cr.yp.to)
4 points by frutiger 59 days ago | past
McEliece Standardisation (cr.yp.to)
2 points by quadhome 60 days ago | past
The Cryptoint Library [pdf] (cr.yp.to)
4 points by todsacerdoti 62 days ago | past
McEliece standardization: Looking at what's happening, and analyzing (cr.yp.to)
3 points by nabla9 63 days ago | past | 1 comment
The McEliece cryptosystem – Daniel J. Bernstein (talk slides) [pdf] (cr.yp.to)
2 points by nabla9 3 months ago | past | 2 comments
Entropy Attacks (cr.yp.to)
102 points by todsacerdoti 3 months ago | past | 32 comments
PQConnect: "TLS is a very large programming project." [pdf] (cr.yp.to)
3 points by 1vuio0pswjnm7 5 months ago | past
Looking at some claims that quantum computers won't work (cr.yp.to)
68 points by gjvc 5 months ago | past | 53 comments
Automated proof of the transcendence of π in HOL light (cr.yp.to)
3 points by keepamovin 6 months ago | past
The sins of the 90s: Questioning a puzzling claim about mass surveillance (cr.yp.to)
243 points by ibotty 8 months ago | past | 193 comments
D. J. Bernstein (cr.yp.to)
2 points by gone35 8 months ago | past
Don't Publish with IEEE (2005) (cr.yp.to)
239 points by stargrave 8 months ago | past | 92 comments
A plea for lean software [pdf] (cr.yp.to)
4 points by udev4096 8 months ago | past | 1 comment
Libntruprime is a microlibrary for the Streamlined NTRU Prime cryptosyst (cr.yp.to)
21 points by zdw 10 months ago | past
Clang vs. Clang (cr.yp.to)
248 points by dchest 10 months ago | past | 399 comments
Plagiarism as a Patent Amplifier (cr.yp.to)
2 points by Tomte 11 months ago | past
Abbreviating the stream-cipher discussions (2005) (cr.yp.to)
1 point by rdpintqogeogsaa 11 months ago | past
Salsa20 ciphers in assembly for different architectures (cr.yp.to)
2 points by jmspring 11 months ago | past | 1 comment
Invulnerable Software (2008) [pdf] (cr.yp.to)
1 point by todsacerdoti 11 months ago | past
Bibliography keys: It's as easy as [1], [2], [3] (cr.yp.to)
64 points by stargrave on June 12, 2024 | past | 27 comments
CryptAttackTester: high-assurance attack analysis (cr.yp.to)
1 point by skilled on June 11, 2024 | past | 1 comment
UTC, Tai, and Unix Time (2001) (cr.yp.to)
142 points by enz on May 9, 2024 | past | 141 comments
How does DNS work? (2002) (cr.yp.to)
16 points by 1vuio0pswjnm7 on April 5, 2024 | past | 13 comments
Keep Secrets from Chrome [pdf] (cr.yp.to)
1 point by weinzierl on March 25, 2024 | past
Keep Secrets from Chrome [pdf] (cr.yp.to)
1 point by weinzierl on March 24, 2024 | past
NSA, NIST, and post-quantum cryptography (cr.yp.to)
2 points by mfrw on March 9, 2024 | past | 1 comment
A modest proposal for reducing mail traffic (1996) (cr.yp.to)
13 points by Shugyousha on Feb 20, 2024 | past | 5 comments
Niklaus Wirth – Plea for Lean Software (1995) [pdf] (cr.yp.to)
4 points by dist-epoch on Feb 13, 2024 | past

Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: