Bernstein and Lange -- Safe curves for Elliptic Curve Cryptography [pdf]
(eprint.iacr.org)
in cryptography@lemmy.ml from solrize@lemmy.world on 14 Aug 09:27
comments (3)
in cryptography@lemmy.ml from solrize@lemmy.world on 14 Aug 09:27
comments (3)
Passive SSH Key Compromise via Lattices
(eprint.iacr.org)
in netsec@lemmy.world from repostbot33@lemmy.world on 14 Nov 2023 18:00
comments (0)
in netsec@lemmy.world from repostbot33@lemmy.world on 14 Nov 2023 18:00
comments (0)
Passive SSH RSA Key Compromise via Lattices
(eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 Nov 2023 12:00
comments (1)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 Nov 2023 12:00
comments (1)
Zero-Knowledge Middleboxes
(eprint.iacr.org)
in netsec@lemmy.world from repostbot33@lemmy.world on 19 Sep 2023 00:00
comments (0)
in netsec@lemmy.world from repostbot33@lemmy.world on 19 Sep 2023 00:00
comments (0)
A Novel Related Nonce Attack for ECDSA
(eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Mar 2023 12:19
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Mar 2023 12:19
comments (0)
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms
(eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Mar 2023 12:18
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Mar 2023 12:18
comments (0)
An efficient key recovery attack on SIDH
(eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 31 Jul 2022 11:53
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 31 Jul 2022 11:53
comments (0)