Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
On the (in)security of ElGamal in OpenPGP [pdf] (iacr.org)
3 points by rdpintqogeogsaa on May 6, 2022 | past
What Cryptographic Library Developers Think About Timing Attacks (2021) [pdf] (iacr.org)
2 points by mooreds on May 5, 2022 | past
Zero-Knowledge Middleboxes: enforce network policies on encrypted traffic (iacr.org)
82 points by self on April 17, 2022 | past | 20 comments
To Shift or Not to Shift: Understanding GEA-1 [pdf] (iacr.org)
1 point by pabs3 on March 25, 2022 | past
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 [pdf] (iacr.org)
3 points by pabs3 on March 25, 2022 | past
Breaking Rainbow Takes a Weekend on a Laptop [pdf] (iacr.org)
3 points by simonebrunozzi on March 23, 2022 | past
Base64 Malleability in Practice (iacr.org)
2 points by rdpintqogeogsaa on March 18, 2022 | past
How Practical Are Fault Injection Attacks, Really? (iacr.org)
2 points by rdpintqogeogsaa on March 8, 2022 | past
Two Attacks on Proof-of-Stake Ghost/Ethereum (iacr.org)
2 points by photon12 on March 8, 2022 | past
Trust dies in darkness: Shedding light on Samsung’s TrustZone Keymaster design [pdf] (iacr.org)
165 points by zdw on March 4, 2022 | past | 27 comments
Samsung Encryption Vulnerability [pdf] (iacr.org)
1 point by News-Dog on March 1, 2022 | past
Breaking Rainbow Takes a Weekend on a Laptop [pdf] (iacr.org)
2 points by DyslexicAtheist on Feb 25, 2022 | past
Breaking rainbow takes a weekend on a laptop (iacr.org)
155 points by jack4818 on Feb 25, 2022 | past | 64 comments
New IACR Journals (iacr.org)
3 points by rdpintqogeogsaa on Feb 22, 2022 | past
Shedding Light on Samsung's TrustZone Keymaster Design (iacr.org)
2 points by tosh on Feb 22, 2022 | past
Trust Dies in Darkness:Shedding Light on Samsung’s TZ Keymaster Design[pdf] (iacr.org)
2 points by jor-el on Feb 22, 2022 | past
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay [pdf] (iacr.org)
4 points by mahirsaid on Feb 20, 2022 | past
Universal Security (2013) [pdf] (iacr.org)
2 points by simonpure on Jan 17, 2022 | past
Critical perspectives on provable security (2019) [pdf] (iacr.org)
2 points by Tomte on Jan 4, 2022 | past
PAKE – Theory, Practice, Standardization and Real-World Lessons (iacr.org)
1 point by 8organicbits on Jan 2, 2022 | past
Non-interactive distributed key generation and key resharing (iacr.org)
1 point by kostadin on Dec 14, 2021 | past
Development of the RISC-V Entropy Source Interface (iacr.org)
1 point by rdpintqogeogsaa on Nov 6, 2021 | past
A Deeper Look at Machine Learning-Based Cryptanalysis (iacr.org)
2 points by rdpintqogeogsaa on Oct 16, 2021 | past
Quantum Money from Quaternion Algebras (iacr.org)
1 point by cinquemb on Oct 7, 2021 | past
Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts (iacr.org)
1 point by X6S1x6Okd1st on Sept 16, 2021 | past
Computing Discrete Logarithms [pdf] (iacr.org)
49 points by nanis on Sept 16, 2021 | past | 3 comments
Pasta: A Case for Hybrid Homomorphic Encryption [pdf] (iacr.org)
3 points by nanis on Sept 16, 2021 | past
ITimed: Cache Attacks on the Apple A10 Fusion SoC [pdf] (iacr.org)
1 point by weinzierl on Sept 15, 2021 | past
ITimed: Cache Attacks on the Apple A10 Fusion SoC [pdf] (iacr.org)
1 point by giuliomagnifico on Sept 14, 2021 | past
THC: Practical and Cost-Effective Verification of Delegated Computation (iacr.org)
2 points by p4bl0 on Sept 8, 2021 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: