Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Subverting Telegram's end-to-end encryption (2023) (iacr.org)
105 points by pona-a 5 months ago | past | 92 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir [pdf] (iacr.org)
4 points by todsacerdoti 6 months ago | past
Camera Zoom Based Cipher Encryption Scheme or Strengthen Weak Encryption (iacr.org)
4 points by gananthraman 6 months ago | past
Tlock: Practical timelock encryption from threshold BLS (2023) [pdf] (iacr.org)
2 points by wslh 6 months ago | past
Coral: Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs (iacr.org)
1 point by petethomas 6 months ago | past
How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org)
2 points by belter 7 months ago | past
Replication of Quantum Factorisation Records with a VIC-20, an Abacus, and a Dog (iacr.org)
84 points by teddyh 8 months ago | past | 25 comments
Replication of Quantum Factorisation Records; a Home Computer, Abacus, and a Dog (iacr.org)
1 point by ChuckMcM 8 months ago | past | 2 comments
Formal Security & Verification of Cryptographic Protocol Implementations in Rust (iacr.org)
2 points by matt_d 8 months ago | past
Replication of Quantum Factorisation with an 8-Bit Computer, an Abacus and a Dog (iacr.org)
3 points by indy 8 months ago | past
Replication of Quantum Factorisation Records with an 8-bit Home Computer [pdf] (iacr.org)
137 points by sebgan 8 months ago | past | 32 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org)
6 points by Bluestein 8 months ago | past
Quantum Computing without the Linear Algebra [pdf] (iacr.org)
2 points by adamnemecek 9 months ago | past
Quantum Computing without the Linear Algebra [pdf] (iacr.org)
1 point by abhi9u 9 months ago | past
Quantum Computing without the Linear Algebra [pdf] (iacr.org)
2 points by marvel_boy 9 months ago | past
AWS introduces key committing variant of XAES-256-GCM [pdf] (iacr.org)
1 point by HillRat 10 months ago | past
OAuth Audience Injection Attacks [pdf] (iacr.org)
1 point by mooreds 10 months ago | past
Traceable Verifiable Random Functions (iacr.org)
2 points by wslh 10 months ago | past
Collisions for MD4, MD5, HAVAL-128 and RIPEMD (2004) [pdf] (iacr.org)
2 points by kretaceous 11 months ago | past
Constant-time code: the pessimist's case (iacr.org)
1 point by fanf2 11 months ago | past
Keying Merkle-Damgård at the Suffix (iacr.org)
1 point by dchest 12 months ago | past
GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and Tetra [pdf] (iacr.org)
2 points by gnabgib 12 months ago | past
Constant-Time Code: The Pessimist Case [pdf] (iacr.org)
92 points by yuedongze on March 9, 2025 | past | 66 comments
Constant-time coding is, or will soon become, infeasible in all generality [pdf] (iacr.org)
1 point by jedisct1 on March 8, 2025 | past
How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org)
2 points by pbrowne011 on Jan 27, 2025 | past
ColliderScript: Covenants in Bitcoin via 160-bit hash collisions (iacr.org)
2 points by noch on Jan 23, 2025 | past
Approaches to Solving SVP in Lattice Cryptography with Quantum Gravity (iacr.org)
1 point by noam_k on Jan 13, 2025 | past
CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust (iacr.org)
1 point by EvgeniyZh on Jan 13, 2025 | past
Knot-based Key Exchange protocol (iacr.org)
1 point by RadixDLT on Dec 17, 2024 | past
Chosen-Prefix Collisions on AES-Like Hashing (iacr.org)
2 points by pentestercrab on Nov 25, 2024 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: