home groups about login help
How to Prove False Statements: Practical Attacks on Fiat-Shamir (eprint.iacr.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Jul 22:37
comments (1)
Constant-Time Code: The Pessimist Case (eprint.iacr.org)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 08 Mar 2025 06:09
comments (0)
Bernstein and Lange -- Safe curves for Elliptic Curve Cryptography [pdf] (eprint.iacr.org)
in cryptography@lemmy.ml from solrize@lemmy.world on 14 Aug 2024 09:27
comments (3)
Passive SSH Key Compromise via Lattices (eprint.iacr.org)
in netsec@lemmy.world from repostbot33@lemmy.world on 14 Nov 2023 18:00
comments (0)
Passive SSH RSA Key Compromise via Lattices (eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 Nov 2023 12:00
comments (1)
Zero-Knowledge Middleboxes (eprint.iacr.org)
in netsec@lemmy.world from repostbot33@lemmy.world on 19 Sep 2023 00:00
comments (0)
A Novel Related Nonce Attack for ECDSA (eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Mar 2023 12:19
comments (0)
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms (eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Mar 2023 12:18
comments (0)
An efficient key recovery attack on SIDH (eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 31 Jul 2022 11:53
comments (0)