| | Some thoughts on security after ten years of qmail 1.0 (2007) [pdf] (cr.yp.to) |
| 2 points by JNRowe 12 days ago | past | discuss |
|
| | Complaint regarding a declaration of consensus to adopt a non-hybrid draft [pdf] (cr.yp.to) |
| 2 points by Perseids 37 days ago | past |
|
| | Debunking NIST's calculation of the Kyber-512 security level (2023) (cr.yp.to) |
| 59 points by RA2lover 3 months ago | past | 21 comments |
|
| | McEliece standardization: Looking at what's happening, and analyzing rationales (cr.yp.to) |
| 5 points by 1vuio0pswjnm7 4 months ago | past |
|
| | The cryptoint library (DJB) [pdf] (cr.yp.to) |
| 4 points by frutiger 4 months ago | past |
|
| | McEliece Standardisation (cr.yp.to) |
| 2 points by quadhome 4 months ago | past |
|
| | The Cryptoint Library [pdf] (cr.yp.to) |
| 4 points by todsacerdoti 4 months ago | past |
|
| | McEliece standardization: Looking at what's happening, and analyzing (cr.yp.to) |
| 3 points by nabla9 4 months ago | past | 1 comment |
|
| | The McEliece cryptosystem – Daniel J. Bernstein (talk slides) [pdf] (cr.yp.to) |
| 2 points by nabla9 5 months ago | past | 2 comments |
|
| | Entropy Attacks (cr.yp.to) |
| 102 points by todsacerdoti 5 months ago | past | 32 comments |
|
| | PQConnect: "TLS is a very large programming project." [pdf] (cr.yp.to) |
| 3 points by 1vuio0pswjnm7 8 months ago | past |
|
| | Looking at some claims that quantum computers won't work (cr.yp.to) |
| 68 points by gjvc 8 months ago | past | 53 comments |
|
| | Automated proof of the transcendence of π in HOL light (cr.yp.to) |
| 3 points by keepamovin 9 months ago | past |
|
| | The sins of the 90s: Questioning a puzzling claim about mass surveillance (cr.yp.to) |
| 243 points by ibotty 10 months ago | past | 193 comments |
|
| | D. J. Bernstein (cr.yp.to) |
| 2 points by gone35 11 months ago | past |
|
| | Don't Publish with IEEE (2005) (cr.yp.to) |
| 239 points by stargrave 11 months ago | past | 92 comments |
|
| | A plea for lean software [pdf] (cr.yp.to) |
| 4 points by udev4096 11 months ago | past | 1 comment |
|
| | Libntruprime is a microlibrary for the Streamlined NTRU Prime cryptosyst (cr.yp.to) |
| 21 points by zdw on Aug 26, 2024 | past |
|
| | Clang vs. Clang (cr.yp.to) |
| 248 points by dchest on Aug 3, 2024 | past | 399 comments |
|
| | Plagiarism as a Patent Amplifier (cr.yp.to) |
| 2 points by Tomte on July 21, 2024 | past |
|
| | Abbreviating the stream-cipher discussions (2005) (cr.yp.to) |
| 1 point by rdpintqogeogsaa on July 12, 2024 | past |
|
| | Salsa20 ciphers in assembly for different architectures (cr.yp.to) |
| 2 points by jmspring on July 11, 2024 | past | 1 comment |
|
| | Invulnerable Software (2008) [pdf] (cr.yp.to) |
| 1 point by todsacerdoti on July 3, 2024 | past |
|
| | Bibliography keys: It's as easy as [1], [2], [3] (cr.yp.to) |
| 64 points by stargrave on June 12, 2024 | past | 27 comments |
|
| | CryptAttackTester: high-assurance attack analysis (cr.yp.to) |
| 1 point by skilled on June 11, 2024 | past | 1 comment |
|
| | UTC, Tai, and Unix Time (2001) (cr.yp.to) |
| 142 points by enz on May 9, 2024 | past | 141 comments |
|
| | How does DNS work? (2002) (cr.yp.to) |
| 16 points by 1vuio0pswjnm7 on April 5, 2024 | past | 13 comments |
|
| | Keep Secrets from Chrome [pdf] (cr.yp.to) |
| 1 point by weinzierl on March 25, 2024 | past |
|
| | Keep Secrets from Chrome [pdf] (cr.yp.to) |
| 1 point by weinzierl on March 24, 2024 | past |
|
| | NSA, NIST, and post-quantum cryptography (cr.yp.to) |
| 2 points by mfrw on March 9, 2024 | past | 1 comment |
|
|
| More |