Cryptography - cryptography@lemmy.ml
- https://lemmy.ml/c/cryptography
cryptography (noun). The discipline concerned with communication security (eg, confidentiality of messages, integrity of messages, sender authentication, non-repudiation of messages, and many other related issues), regardless of the used medium such as pencil and paper or computers. This community is for links about and discussion of cryptography specifically. For privacy technology more generally, use !privacy. This community is explicitly not about cryptocurrency; see !crypto for that.About
"The sins of the 90s": Questioning a puzzling claim by Meredith Whittaker about mass surveillance
(blog.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 29 Oct 16:58
comments (1)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 29 Oct 16:58
comments (1)
NIST Announces 14 Candidates to Advance to the Second Round of the Additional Digital Signatures for the Post-Quantum Cryptography Standardization Process
(csrc.nist.gov)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 25 Oct 13:02
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 25 Oct 13:02
comments (0)
[Idea] FHE-RAM-based message routing
in cryptography@lemmy.ml from pancake@lemmygrad.ml on 30 Aug 2024 08:18
comments (0)
in cryptography@lemmy.ml from pancake@lemmygrad.ml on 30 Aug 2024 08:18
comments (0)
NSA's influence on cryptographic standards (slides from a 2022 talk by D. J. Bernstein)
(cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 26 Aug 2024 21:40
comments (3)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 26 Aug 2024 21:40
comments (3)
Public Key Cryptography - Computerphile
(www.youtube.com)
in cryptography@lemmy.ml from yo_scottie_oh@lemmy.ml on 26 Aug 2024 21:05
comments (0)
in cryptography@lemmy.ml from yo_scottie_oh@lemmy.ml on 26 Aug 2024 21:05
comments (0)
Encrypted P2P Chat
(chat.positive-intentions.com)
in cryptography@lemmy.ml from positive_intentions@lemmy.ml on 19 Aug 2024 21:46
comments (17)
in cryptography@lemmy.ml from positive_intentions@lemmy.ml on 19 Aug 2024 21:46
comments (17)
Bernstein and Lange -- Safe curves for Elliptic Curve Cryptography [pdf]
(eprint.iacr.org)
in cryptography@lemmy.ml from solrize@lemmy.world on 14 Aug 2024 09:27
comments (3)
in cryptography@lemmy.ml from solrize@lemmy.world on 14 Aug 2024 09:27
comments (3)
The government unveils its quantum counter-weapons
(www.politico.com)
in cryptography@lemmy.ml from solrize@lemmy.world on 14 Aug 2024 00:00
comments (2)
in cryptography@lemmy.ml from solrize@lemmy.world on 14 Aug 2024 00:00
comments (2)
badkeys.info - checking cryptographic public keys for known vulnerabilities
(badkeys.info)
in cryptography@lemmy.ml from hanno@lemmy.world on 31 Jul 2024 08:59
comments (0)
in cryptography@lemmy.ml from hanno@lemmy.world on 31 Jul 2024 08:59
comments (0)
Tomb, encrypting your precious data since 2007. Version 2.11 was just released.
(github.com)
in cryptography@lemmy.ml from setto@fed.dyne.org on 12 Jul 2024 17:09
comments (0)
in cryptography@lemmy.ml from setto@fed.dyne.org on 12 Jul 2024 17:09
comments (0)
A tool for encrypting files using puzzle based time-lock encryption and password
in cryptography@lemmy.ml from Super_gamer46861@lemmy.world on 07 Jul 2024 08:20
comments (0)
in cryptography@lemmy.ml from Super_gamer46861@lemmy.world on 07 Jul 2024 08:20
comments (0)
Multiple nations enact mysterious export controls on quantum computers
(www.newscientist.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 05 Jul 2024 11:49
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 05 Jul 2024 11:49
comments (0)
Javascript cryptography in the wild
(github.com)
in cryptography@lemmy.ml from positive_intentions@lemmy.ml on 14 Jun 2024 12:27
comments (2)
in cryptography@lemmy.ml from positive_intentions@lemmy.ml on 14 Jun 2024 12:27
comments (2)
How to implement a secure Microsoft Recall alternative?
in cryptography@lemmy.ml from I_like_cats@lemmy.one on 07 Jun 2024 18:31
comments (12)
in cryptography@lemmy.ml from I_like_cats@lemmy.one on 07 Jun 2024 18:31
comments (12)
Randomness on Apple Platforms: "I’m sure the people working on this know what they’re doing, so it’s probably all very reasonable"
(blog.xoria.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 May 2024 13:35
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 May 2024 13:35
comments (0)
Keeping Secrets
(stanfordmag.org)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 29 Apr 2024 15:16
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 29 Apr 2024 15:16
comments (0)
Hatching Secret Sauce Eggs is a Rooster's Business
(neon.nightbulb.net)
in cryptography@lemmy.ml from firefly@neon.nightbulb.net on 15 Apr 2024 10:42
comments (0)
in cryptography@lemmy.ml from firefly@neon.nightbulb.net on 15 Apr 2024 10:42
comments (0)
A quick post on Chen’s algorithm
(blog.cryptographyengineering.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 17 Apr 2024 01:03
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 17 Apr 2024 01:03
comments (0)
Putty vulnerability: bias in ECDSA deterministic nonce generation leads to compromise of NIST P521 keys with ~60 signatures
(www.chiark.greenend.org.uk)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Apr 2024 20:25
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Apr 2024 20:25
comments (0)
Web-based cryptography is always snake oil
(www.devever.net)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 10 Apr 2024 02:03
comments (4)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 10 Apr 2024 02:03
comments (4)
SimpleX: adding quantum resistance to Signal double ratchet algorithm (with Streamlined NTRU Prime)
(simplex.chat)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 14 Mar 2024 15:29
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 14 Mar 2024 15:29
comments (0)
Security Cryptography Whatever - Post-Quantum iMessage with Douglas Stebila
(podcasts.google.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 04 Mar 2024 12:50
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 04 Mar 2024 12:50
comments (0)
Dice Random Numbers – Simon Josefsson's blog
(blog.josefsson.org)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 02 Mar 2024 19:11
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 02 Mar 2024 19:11
comments (0)
The Fi Virtual Carrier Network
(www.gstatic.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 21 Feb 2024 17:51
comments (1)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 21 Feb 2024 17:51
comments (1)
Backdoors that let cops decrypt messages violate human rights, EU court says
(arstechnica.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Feb 2024 18:35
comments (1)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Feb 2024 18:35
comments (1)
Attack of the week: Airdrop tracing
(blog.cryptographyengineering.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 12 Jan 2024 00:31
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 12 Jan 2024 00:31
comments (0)
KyberSlash: timing vulnerabilities allow recovering private keys in most Kyber implementations. patches available
(kyberslash.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 10 Jan 2024 10:47
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 10 Jan 2024 10:47
comments (0)
28 years later, ETSI's TETRA committee unanimously votes to open source their secret encryption algorithms
(www.theregister.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 16 Nov 2023 17:00
comments (2)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 16 Nov 2023 17:00
comments (2)
Passive SSH RSA Key Compromise via Lattices
(eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 Nov 2023 12:00
comments (1)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 Nov 2023 12:00
comments (1)
Nearly-finalized eIDAS legislation requires browsers to trust state-issued CAs, and prohibits using certificate transparency to prevent abuses of them: only ETSI-approved authenticity checks allowed.
(last-chance-for-eidas.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 02 Nov 2023 15:33
comments (1)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 02 Nov 2023 15:33
comments (1)
Crypto power to the people!
in cryptography@lemmy.ml from setto@fed.dyne.org on 01 Nov 2023 14:57
comments (2)
in cryptography@lemmy.ml from setto@fed.dyne.org on 01 Nov 2023 14:57
comments (2)
The inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level.
(blog.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 13 Oct 2023 10:49
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 13 Oct 2023 10:49
comments (0)
Quantum Resistance and the Signal Protocol
(signal.org)
in cryptography@lemmy.ml from Voyager@psychedelia.ink on 20 Sep 2023 09:43
comments (6)
in cryptography@lemmy.ml from Voyager@psychedelia.ink on 20 Sep 2023 09:43
comments (6)
How to Write a Secure JWT Library If You Absolutely Must
(scottarc.blog)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 06 Sep 2023 11:29
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 06 Sep 2023 11:29
comments (0)
AES: How to Design Secure Encryption (Spanning Tree)
(piped.video)
in cryptography@lemmy.ml from Spzi@lemm.ee on 25 Aug 2023 18:41
comments (0)
in cryptography@lemmy.ml from Spzi@lemm.ee on 25 Aug 2023 18:41
comments (0)
Innovations in the AWS Database Encryption SDK
(scottarc.blog)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 18 Aug 2023 10:48
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 18 Aug 2023 10:48
comments (0)
The Cryptographer Who Ensures We Can Trust Our Computers
(www.quantamagazine.org)
in cryptography@lemmy.ml from tedu on 28 Jul 2023 18:51
comments (1)
in cryptography@lemmy.ml from tedu on 28 Jul 2023 18:51
comments (1)
Interview with the ETSI Standards Organization That Created TETRA "Backdoor"
(zetter.substack.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 26 Jul 2023 14:07
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 26 Jul 2023 14:07
comments (0)
All cops are broadcasting: breaking TETRA after decades in the shadows
(www.midnightblue.nl)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 24 Jul 2023 19:00
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 24 Jul 2023 19:00
comments (0)
17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22US
(yewtu.be)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 24 Jun 2023 14:23
comments (1)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 24 Jun 2023 14:23
comments (1)
Passkeys: The Good, the Bad and the Ugly
(yewtu.be)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 11 Jun 2023 17:08
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 11 Jun 2023 17:08
comments (0)
On Ashton Kutcher and Secure Multi-Party Computation
(blog.cryptographyengineering.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 14 May 2023 20:25
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 14 May 2023 20:25
comments (0)
Book Review: Red Team Blues
(blog.cryptographyengineering.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 24 Apr 2023 23:36
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 24 Apr 2023 23:36
comments (0)
an audit of a fintech company's threshold ECDSA implementation yielded four CVEs
(research.kudelskisecurity.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 27 Mar 2023 16:04
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 27 Mar 2023 16:04
comments (0)
Information Security—Before & After Public-Key Cryptography
(invidious.projectsegfau.lt)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 19 Mar 2023 13:30
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 19 Mar 2023 13:30
comments (0)
How Not to Learn Cryptography
(esl.cs.brown.edu)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 15 Mar 2023 02:55
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 15 Mar 2023 02:55
comments (0)
Theory and Practice of Cryptography
(vid.puffyan.us)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 11 Mar 2023 16:12
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 11 Mar 2023 16:12
comments (0)
A Novel Related Nonce Attack for ECDSA
(eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Mar 2023 12:19
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Mar 2023 12:19
comments (0)
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms
(eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Mar 2023 12:18
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Mar 2023 12:18
comments (0)
Deciphering Queen Of Scots, Mary Stuart’s Lost Letters
(hackaday.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 12 Feb 2023 15:54
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 12 Feb 2023 15:54
comments (0)
Three Lessons from Threema: Analysis of a Secure Messenger
(breakingthe3ma.app)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 09 Jan 2023 22:04
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 09 Jan 2023 22:04
comments (0)
"We estimate that a quantum circuit with 372 physical qubits and a depth of thousands is necessary to challenge RSA-2048 using our algorithm"
(arxiv.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 04 Jan 2023 12:19
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 04 Jan 2023 12:19
comments (0)
ImperialViolet - Cryptographic Agility
(www.imperialviolet.org)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 21 Dec 2022 13:48
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 21 Dec 2022 13:48
comments (0)
Pollard rho on the playstation 3
(www.joppebos.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 20 Dec 2022 00:31
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 20 Dec 2022 00:31
comments (0)
Too Many Keys: Aggregatable Distributed Key Generation – Philipp Jovanovic – Too Much Crypto
(invidious.projectsegfau.lt)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 17 Dec 2022 15:59
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 17 Dec 2022 15:59
comments (0)
GitHub - cyphar/paperback: Paper backup generator suitable for long-term storage.
(github.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 24 Nov 2022 12:29
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 24 Nov 2022 12:29
comments (0)
One-Time Programs
(blog.cryptographyengineering.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 29 Oct 2022 14:14
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 29 Oct 2022 14:14
comments (0)
SHA-3 Buffer Overflow
(mouha.be)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 20 Oct 2022 23:18
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 20 Oct 2022 23:18
comments (0)
Practically-exploitable Cryptographic Vulnerabilities in Matrix
(nebuchadnezzar-megolm.github.io)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 28 Sep 2022 16:34
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 28 Sep 2022 16:34
comments (0)
PQCrypto 2022 is September 28–30 but the talks are already online; during the live session each paper gets 15 min for highlights and Q&A so it's recommended to watch the videos before
(nitter.net)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 27 Sep 2022 14:02
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 27 Sep 2022 14:02
comments (0)
Cryptography: From Mathematical Magic to Secure Communication
(yewtu.be)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 14 Sep 2022 00:26
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 14 Sep 2022 00:26
comments (0)
How to generate and exchange secrets
(ieeexplore.ieee.org)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 05 Sep 2022 00:16
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 05 Sep 2022 00:16
comments (0)
NSA, NIST, and post-quantum cryptography: [Daniel J. Bernstein announces] second lawsuit against the U.S. government.
(blog.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Aug 2022 16:20
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Aug 2022 16:20
comments (0)
So you want to build a mixnet? a composite reading list for anyone interested in creating a new decryption mix network.
(github.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 31 Jul 2022 13:27
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 31 Jul 2022 13:27
comments (0)
An efficient key recovery attack on SIDH
(eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 31 Jul 2022 11:53
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 31 Jul 2022 11:53
comments (0)
How to assess an e-voting system
(freedom-to-tinker.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 11 Jul 2022 14:23
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 11 Jul 2022 14:23
comments (0)
VoteXX – chaum.com
(chaum.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 08 Jul 2022 14:59
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 08 Jul 2022 14:59
comments (0)
Elligator: Hiding cryptographic key exchange as random noise
(elligator.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 Jul 2022 12:07
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 Jul 2022 12:07
comments (0)
After careful consideration during the 3rd Round of the NIST Post-Quantum Cryptography Standardization Process, NIST has identified four candidate algorithms for standardization
(csrc.nist.gov)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 05 Jul 2022 18:04
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 05 Jul 2022 18:04
comments (0)
EdDSA (Ed25519) Double-PubKey Oracle attack - Affected libraries
(github.com)
in cryptography@lemmy.ml from cel@lemmy.ml on 03 Jul 2022 07:20
comments (0)
in cryptography@lemmy.ml from cel@lemmy.ml on 03 Jul 2022 07:20
comments (0)
View of Thomson’s Telegram Decrypting a Secret Message from Albania, 1914
(ecp.ep.liu.se)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 28 Jun 2022 21:26
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 28 Jun 2022 21:26
comments (0)
sha1dc "essentially enables protection of applications against SHA-1 collisions with no further changes in the application"
(github.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 25 Jun 2022 14:50
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 25 Jun 2022 14:50
comments (0)
How to Share a Secret (Shamir 1979)
(web.mit.edu)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 23 Jun 2022 12:04
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 23 Jun 2022 12:04
comments (0)
timing.attacks.cr.yp.to is aimed at end users, operating-system distributors, CPU manufacturers, and software engineers who would like to know what they can do to protect data against timing attacks
(timing.attacks.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 21 Jun 2022 13:24
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 21 Jun 2022 13:24
comments (0)
Visualizing Elliptic Curves
(curves.ulfheim.net)
in cryptography@lemmy.ml from yogthos@lemmy.ml on 17 Jun 2022 02:41
comments (0)
in cryptography@lemmy.ml from yogthos@lemmy.ml on 17 Jun 2022 02:41
comments (0)
How a Saxophonist Tricked the KGB by Encrypting Secrets in Music
(www.wired.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 16 Jun 2022 16:59
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 16 Jun 2022 16:59
comments (0)
If OpenSSL were a GUI
(smallstep.com)
in cryptography@lemmy.ml from null_radix@lemmy.ml on 12 Jun 2022 22:34
comments (0)
in cryptography@lemmy.ml from null_radix@lemmy.ml on 12 Jun 2022 22:34
comments (0)
Philip Zimmermann, Inventor of PGP on Preserving Democracy with Cryptography – Monerotopia 2022
(yewtu.be)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 17 May 2022 18:18
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 17 May 2022 18:18
comments (0)
Some Cryptography Books I Like - Cronokirby
(cronokirby.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 16 May 2022 11:03
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 16 May 2022 11:03
comments (0)
The Joy of Cryptography
(joyofcryptography.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 13 May 2022 12:59
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 13 May 2022 12:59
comments (0)
Vulnerabilities affecting Girault, Bulletproofs, and PlonK
(blog.trailofbits.com)
in cryptography@lemmy.ml from nlfx@lemmy.ml on 14 Apr 2022 07:19
comments (0)
in cryptography@lemmy.ml from nlfx@lemmy.ml on 14 Apr 2022 07:19
comments (0)
Introduction - Minimum Anti-Collusion Infrastructure
(appliedzkp.github.io)
in cryptography@lemmy.ml from null_radix@lemmy.ml on 11 Apr 2022 15:47
comments (0)
in cryptography@lemmy.ml from null_radix@lemmy.ml on 11 Apr 2022 15:47
comments (0)
How to prove you know a secret, without revealing what it is
(www.youtube.com)
in cryptography@lemmy.ml from Sal@mander.xyz on 05 Apr 2022 19:42
comments (0)
in cryptography@lemmy.ml from Sal@mander.xyz on 05 Apr 2022 19:42
comments (0)
Call for Papers: CFAIL - The Conference for Failed Approaches and Insightful Losses in Cryptology
(www.cfail.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 14 Mar 2022 17:07
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 14 Mar 2022 17:07
comments (0)
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability (Chaum 1988)
(www.chaum.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 05 Mar 2022 13:40
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 05 Mar 2022 13:40
comments (0)
The Moral Character of Cryptographic Work
(www.cs.ucdavis.edu)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 02 Mar 2022 12:38
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 02 Mar 2022 12:38
comments (0)