Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Privacy-Preserving Proof-Of-Stake (2019)[PDF] (iacr.org)
1 point by optimalsolver on Aug 22, 2021 | past
Proof-of-Burn [pdf] (iacr.org)
4 points by galfarragem on Aug 22, 2021 | past
Game-Theoretic Fairness Meets Multi-Party Protocols: The Case of Leader Election [pdf] (iacr.org)
3 points by simonpure on Aug 17, 2021 | past
Streamlet: Textbook Streamlined Blockchains (2020) [pdf] (iacr.org)
2 points by simonpure on Aug 16, 2021 | past
Fast Factoring Integers by SVP Algorithms (“This Destroys RSA”) (iacr.org)
5 points by p4bl0 on July 9, 2021 | past | 1 comment
Boosting Brute-Force Attacks on iPhone’s User Authentication Through SCA [pdf] (iacr.org)
2 points by motge on July 4, 2021 | past
SoK: Gröbner Basis Algorithms for Arithmetization Oriented Ciphers (iacr.org)
4 points by pavestone on June 30, 2021 | past | 2 comments
Evidence France might have backdoored GPRS encryption [pdf] (iacr.org)
3 points by smallpipe on June 20, 2021 | past | 2 comments
Antikernel: A Decentralized Secure Operating System Architecture (2016) [pdf] (iacr.org)
88 points by ingve on June 18, 2021 | past | 32 comments
Time-Locked Encryption [pdf] (iacr.org)
8 points by civitaur on June 17, 2021 | past
Time-Locked Encryption [pdf] (iacr.org)
1 point by civitaur on June 16, 2021 | past
Cryptanalysis of GPRS Encryption Algorithms GEA-1 suggest intentional weakness (iacr.org)
487 points by anonymfus on June 16, 2021 | past | 107 comments
Time-Locked Encryption (iacr.org)
4 points by tatatatle on June 15, 2021 | past
Time-locked Encryption Made Practical [pdf] (iacr.org)
3 points by tatle on June 14, 2021 | past
How to Mimic Bitcoin via Proof-of-Stake [pdf] (iacr.org)
2 points by wslh on May 27, 2021 | past
Mobile private contact discovery at scale (iacr.org)
1 point by ignoramous on May 26, 2021 | past
Security and Trust in Open Source Security Tokens (iacr.org)
1 point by nfrankel on May 21, 2021 | past
Critical perspectives on provable security (2019) [pdf] (iacr.org)
1 point by Tomte on April 21, 2021 | past
Stealthy Dopant-Level Hardware Trojans (2013) [pdf] (iacr.org)
38 points by weinzierl on April 19, 2021 | past | 3 comments
Stealthy Dopant-Level Hardware Trojans [pdf] (iacr.org)
1 point by weinzierl on April 18, 2021 | past
How to Backdoor a Cipher (iacr.org)
7 points by EthanHeilman on April 7, 2021 | past | 1 comment
Iacr.org Website Taken over by Satoshi (iacr.org)
3 points by istillwritecode on April 1, 2021 | past | 1 comment
Attacking (EC)DSA with Partially Known Multiples of Nonces (iacr.org)
2 points by nanis on March 18, 2021 | past
What is the funniest number in cryptography? 0 (iacr.org)
3 points by nanis on March 12, 2021 | past
Breaking the “Lattice Barrier” for the Hidden Number Problem (iacr.org)
35 points by nanis on March 5, 2021 | past | 3 comments
Alt-Coin Traceability [pdf] (iacr.org)
8 points by lawrenceyan on March 4, 2021 | past
Fast Factoring Integers by SVP Algorithms: “This Destroys the RSA Cryptosystem.” [pdf] (iacr.org)
14 points by sb057 on March 4, 2021 | past | 4 comments
Factoring Integers by CVP and SVP Algorithms [pdf] (iacr.org)
4 points by LopRabbit on March 3, 2021 | past
“This destroys the RSA cryptosystem” (iacr.org)
279 points by renaudg on March 2, 2021 | past | 146 comments
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy (2020) [pdf] (iacr.org)
1 point by dgellow on Feb 4, 2021 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: