Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Subverting Telegram’s End-to-End Encryption (iacr.org)
2 points by ototot on March 26, 2023 | past | 1 comment
A Vulnerability in Implementations of SHA-3, Shake, EdDSA, and Other NIST-Appro [pdf] (iacr.org)
1 point by todsacerdoti on March 12, 2023 | past
Analysis of Ripemd-160: New Collision Attacks and Finding Characteristics with [pdf] (iacr.org)
1 point by todsacerdoti on March 12, 2023 | past
A Vulnerability in Implementations of SHA-3, Shake, EdDSA (iacr.org)
185 points by state on March 7, 2023 | past | 47 comments
Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography (iacr.org)
59 points by Laaas on March 5, 2023 | past | 7 comments
Side-channel attack on CRYSTALS-Kyber, selected post-quantun cipher [pdf] (iacr.org)
2 points by lknik on March 1, 2023 | past
A security analysis comparison between Signal, WhatsApp and Telegram (iacr.org)
3 points by jjav on Jan 23, 2023 | past
A Practical Template Attack on Crystals-Dilithium [pdf] (iacr.org)
2 points by todsacerdoti on Jan 20, 2023 | past
A Gentle Tutorial for Lattice-Based Cryptanalysis [pdf] (iacr.org)
14 points by todsacerdoti on Jan 20, 2023 | past | 1 comment
Fermat Factorization in the Wild (iacr.org)
1 point by rcarmo on Jan 10, 2023 | past
Fermat Factorization in the Wild (iacr.org)
1 point by _Microft on Jan 9, 2023 | past
Reinforced Concrete: A Fast Hash Function for Verifiable Computation (iacr.org)
1 point by simonpure on Dec 16, 2022 | past
Breaking Halfloop-24 (iacr.org)
1 point by wglb on Sept 18, 2022 | past
Breaking SIDH in polynomial time [pdf] (iacr.org)
2 points by mooreds on Aug 31, 2022 | past
Breaking SIDH in Polynomial Time (iacr.org)
3 points by g0xA52A2A on Aug 11, 2022 | past | 1 comment
Too Much Crypto (2019) [pdf] (iacr.org)
1 point by woodruffw on Aug 6, 2022 | past
Critical perspectives on provable security (2019) [pdf] (iacr.org)
1 point by Tomte on Aug 3, 2022 | past
Post-quantum cryptography–-dealing with the fallout of physics success (iacr.org)
3 points by anupj on Aug 2, 2022 | past
An efficient key recovery attack on SIDH [pdf] (iacr.org)
1 point by arkadiyt on July 30, 2022 | past
An efficient key recovery attack on SIDH (iacr.org)
52 points by robinhouston on July 30, 2022 | past | 14 comments
(In)security of the Radio Interface in Sigfox [pdf] (iacr.org)
3 points by teleforce on July 30, 2022 | past
Cryptanalyzing MEGA in Six Queries (iacr.org)
44 points by rudyruiz on July 16, 2022 | past | 11 comments
Cryptanalyzing Mega in Six Queries [pdf] (iacr.org)
3 points by edenceover on July 15, 2022 | past
Unclonable Polymers and Their Cryptographic Applications (iacr.org)
35 points by somezero on May 31, 2022 | past | 9 comments
Provable Security Analysis of FIDO2 (iacr.org)
1 point by simonpure on May 30, 2022 | past
Anamorphic Encryption: Private Communication Against a Dictator (iacr.org)
3 points by homarp on May 27, 2022 | past
Seedless Fruit Is the Sweetest: Random Number Generation, Revisited (2019) (iacr.org)
1 point by rdpintqogeogsaa on May 26, 2022 | past
Caulk: Lookup Arguments in Sublinear Time (iacr.org)
2 points by ricochet11 on May 24, 2022 | past
Private Approximate Nearest Neighbor Search with Sublinear Communication [pdf] (iacr.org)
2 points by taubek on May 20, 2022 | past
On the Cryptographic Fragility of the Telegram Ecosystem (iacr.org)
2 points by mritzmann on May 17, 2022 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: