Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol [pdf] (2019) (iacr.org)
90 points by dgellow on Jan 31, 2021 | past | 70 comments
Streaming Merkle Proofs in Binary Numeral Trees (iacr.org)
6 points by nemo1618 on Jan 12, 2021 | past
Cryptographic Competitions (iacr.org)
3 points by MrXOR on Dec 29, 2020 | past | 1 comment
Partitioning Oracle Attacks (iacr.org)
6 points by tptacek on Dec 26, 2020 | past | 1 comment
On the Security of Homomorphic Encryption on Approximate Numbers [pdf] (iacr.org)
2 points by JMill on Dec 9, 2020 | past
Single-Message Credential-Hiding Login [pdf] (iacr.org)
3 points by earthboundkid on Dec 6, 2020 | past
How to abuse and fix authenticated encryption without key commitment (iacr.org)
2 points by fanf2 on Nov 20, 2020 | past
How to Abuse and Fix Authenticated Encryption Without Key Commitment (iacr.org)
1 point by g0xA52A2A on Nov 19, 2020 | past
Indistinguishability Obfuscation from Well-Founded Assumptions [pdf] (iacr.org)
1 point by nobody9999 on Nov 11, 2020 | past | 1 comment
Asynchronous Remote Key Generation: An Analysis of Yubicos Proposal for WebAuthn [pdf] (iacr.org)
2 points by vanburen on Nov 2, 2020 | past
A Discretization Attack [pdf] (iacr.org)
2 points by JoachimS on Nov 2, 2020 | past
Vault1317/signal-dakez: pubkey concealing and deniablity based on OTRv3/Signal (iacr.org)
2 points by hardenedvault on Oct 16, 2020 | past
Taming the Many EdDSAs (iacr.org)
1 point by MrXOR on Oct 9, 2020 | past
Computation of a 30750-Bit Binary Field Discrete Logarithm (iacr.org)
52 points by MrXOR on Oct 6, 2020 | past | 22 comments
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies [pdf] (iacr.org)
2 points by gjvc on Sept 29, 2020 | past
An openly mintable cryptocurrency could be on the horizon [pdf] (iacr.org)
1 point by rami-khalil on Sept 26, 2020 | past | 1 comment
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol (iacr.org)
3 points by beefhash on Aug 29, 2020 | past
The Sorcerer’s Apprentice Guide to Fault Attacks (2004) (iacr.org)
1 point by segfaultbuserr on Aug 10, 2020 | past
How to Run Turing Machines on Encrypted Data [pdf] (iacr.org)
70 points by skissane on Aug 1, 2020 | past | 2 comments
The Design of Scalar AES Instruction Set Extensions for RISC-V (iacr.org)
58 points by g0xA52A2A on July 30, 2020 | past | 39 comments
Decentralized Anonymous Credentials (2013) [pdf] (iacr.org)
2 points by malwarebytess on July 25, 2020 | past
Asynchronous Byzantine Agreement with Subquadratic Communication [pdf] (iacr.org)
1 point by wslh on July 15, 2020 | past
Minerva: The curse of ECDSA nonces (cryptography) [pdf] (iacr.org)
2 points by some_furry on June 21, 2020 | past
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography [pdf] (iacr.org)
2 points by blopeur on June 1, 2020 | past
[dupe] SHA-1 collisions now cost $45k [pdf] (iacr.org)
128 points by AndrewDucker on May 29, 2020 | past | 62 comments
LadderLeak: Breaking Ecdsa with Less Than One Bit of Nonce Leakage [pdf] (iacr.org)
3 points by Tomte on May 28, 2020 | past
LadderLeak: Breaking Ecdsa with Less Than One Bit of Nonce Leakage (iacr.org)
7 points by beefhash on May 27, 2020 | past
LadderLeak: Breaking ECDSA with Less Than One Bit of Nonce Leakage (iacr.org)
3 points by some_furry on May 26, 2020 | past
Too Much Crypto [pdf] (iacr.org)
2 points by fantastisch on May 24, 2020 | past
Improved Classical and Quantum Algorithms for Subset-Sum [pdf] (iacr.org)
2 points by wslh on May 19, 2020 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: