home groups about login help
Mixing up Public and Private Keys in OpenID Connect deployments (blog.hboeck.de)
in cryptography@lemmy.ml from hanno@lemmy.world on 25 Feb 2025 18:33
comments (0)
As expensive as a plane flight: Looking at some claims that quantum computers won't work. (blog.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 19 Jan 2025 03:45
comments (0)
On the Proof of Ownership of Digital Wallets (www.mdpi.com)
in cryptography@lemmy.ml from jaromil@fed.dyne.org on 14 Jan 2025 05:10
comments (1)
Project Uniquonym - a concept (not yet implemented) for coupling pseudonymity with limits on sybil attacks / astroturfing (lemmy.amxl.com)
in cryptography@lemmy.ml from A1kmm@lemmy.amxl.com on 01 Jan 2025 13:42
comments (0)
GOLDILOCKER Brain Wallet - Generate OpenSSL Goldilocks Elliptic Curve Keys from Seed Phrase
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 2024 23:45
comments (0)
KSRNG - Key Strike Random Generator (version 0.0.1)
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 2024 23:29
comments (2)
MEGARAND Extreme Overkill Random Seed Generator
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 2024 23:27
comments (2)
Cryptologue Arcade - Crypto Darkpaper - Crypto Color Prints - Simplementation Scheme : A Color-Coded Method For Indexing Research and Documentation
in cryptography@lemmy.ml from octade@soc.octade.net on 15 Dec 2024 14:25
comments (0)
Hexlish Alphabet for English, Constructed Languages and Cryptography: Automatic, Structural Compression with a Phonetic Hexadecimal Alphabet
in cryptography@lemmy.ml from octade@soc.octade.net on 15 Dec 2024 14:17
comments (0)
LatticeGen: how to hide LLM conversations for Privacy-Aware Cloud AI (arxiv.org)
in cryptography@lemmy.ml from jaromil@fed.dyne.org on 04 Nov 2024 14:43
comments (0)
"The sins of the 90s": Questioning a puzzling claim by Meredith Whittaker about mass surveillance (blog.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 29 Oct 2024 16:58
comments (1)
NIST Announces 14 Candidates to Advance to the Second Round of the Additional Digital Signatures for the Post-Quantum Cryptography Standardization Process (csrc.nist.gov)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 25 Oct 2024 13:02
comments (0)
NSA's influence on cryptographic standards (slides from a 2022 talk by D. J. Bernstein) (cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 26 Aug 2024 21:40
comments (3)
Public Key Cryptography - Computerphile (www.youtube.com)
in cryptography@lemmy.ml from yo_scottie_oh@lemmy.ml on 26 Aug 2024 21:05
comments (0)
Encrypted P2P Chat (chat.positive-intentions.com)
in cryptography@lemmy.ml from positive_intentions@lemmy.ml on 19 Aug 2024 21:46
comments (17)
Bernstein and Lange -- Safe curves for Elliptic Curve Cryptography [pdf] (eprint.iacr.org)
in cryptography@lemmy.ml from solrize@lemmy.world on 14 Aug 2024 09:27
comments (3)
The government unveils its quantum counter-weapons (www.politico.com)
in cryptography@lemmy.ml from solrize@lemmy.world on 14 Aug 2024 00:00
comments (2)
badkeys.info - checking cryptographic public keys for known vulnerabilities (badkeys.info)
in cryptography@lemmy.ml from hanno@lemmy.world on 31 Jul 2024 08:59
comments (0)
Tomb, encrypting your precious data since 2007. Version 2.11 was just released. (github.com)
in cryptography@lemmy.ml from setto@fed.dyne.org on 12 Jul 2024 17:09
comments (0)
Multiple nations enact mysterious export controls on quantum computers (www.newscientist.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 05 Jul 2024 11:49
comments (0)
Javascript cryptography in the wild (github.com)
in cryptography@lemmy.ml from positive_intentions@lemmy.ml on 14 Jun 2024 12:27
comments (2)
AES-GCM and breaking it on nonce reuse (frereit.de)
in cryptography from tedu on 12 Jun 2024 05:34
comments (0)
Attacking NIST SP 800-108 Key Derivation using Pseudorandom Functions (scottarc.blog)
in cryptography from tedu on 07 Jun 2024 20:49
comments (0)
How to implement a secure Microsoft Recall alternative?
in cryptography@lemmy.ml from I_like_cats@lemmy.one on 07 Jun 2024 18:31
comments (12)
Randomness on Apple Platforms: "I’m sure the people working on this know what they’re doing, so it’s probably all very reasonable" (blog.xoria.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 May 2024 13:35
comments (0)
Keeping Secrets (stanfordmag.org)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 29 Apr 2024 15:16
comments (0)
Hatching Secret Sauce Eggs is a Rooster's Business (neon.nightbulb.net)
in cryptography@lemmy.ml from firefly@neon.nightbulb.net on 15 Apr 2024 10:42
comments (0)
A quick post on Chen’s algorithm (blog.cryptographyengineering.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 17 Apr 2024 01:03
comments (0)
Putty vulnerability: bias in ECDSA deterministic nonce generation leads to compromise of NIST P521 keys with ~60 signatures (www.chiark.greenend.org.uk)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Apr 2024 20:25
comments (0)
Web-based cryptography is always snake oil (www.devever.net)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 10 Apr 2024 02:03
comments (4)
SimpleX: adding quantum resistance to Signal double ratchet algorithm (with Streamlined NTRU Prime) (simplex.chat)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 14 Mar 2024 15:29
comments (0)
Security Cryptography Whatever - Post-Quantum iMessage with Douglas Stebila (podcasts.google.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 04 Mar 2024 12:50
comments (0)
Dice Random Numbers – Simon Josefsson's blog (blog.josefsson.org)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 02 Mar 2024 19:11
comments (0)
The Fi Virtual Carrier Network (www.gstatic.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 21 Feb 2024 17:51
comments (1)
Backdoors that let cops decrypt messages violate human rights, EU court says (arstechnica.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Feb 2024 18:35
comments (1)
Post-Quantum Cryptography For The Go Ecosystem (words.filippo.io)
in cryptography from tedu on 31 Jan 2024 22:50
comments (2)
Unsigned Commits (blog.glyph.im)
in versioncontrol from stsp on 25 Jan 2024 10:47
comments (0)
Attack of the week: Airdrop tracing (blog.cryptographyengineering.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 12 Jan 2024 00:31
comments (0)
KyberSlash: timing vulnerabilities allow recovering private keys in most Kyber implementations. patches available (kyberslash.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 10 Jan 2024 10:47
comments (0)
28 years later, ETSI's TETRA committee unanimously votes to open source their secret encryption algorithms (www.theregister.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 16 Nov 2023 17:00
comments (2)
Passive SSH RSA Key Compromise via Lattices (eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 Nov 2023 12:00
comments (1)
Nearly-finalized eIDAS legislation requires browsers to trust state-issued CAs, and prohibits using certificate transparency to prevent abuses of them: only ETSI-approved authenticity checks allowed. (last-chance-for-eidas.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 02 Nov 2023 15:33
comments (1)
Crypto power to the people!
in cryptography@lemmy.ml from setto@fed.dyne.org on 01 Nov 2023 14:57
comments (2)
The inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level. (blog.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 13 Oct 2023 10:49
comments (0)
The Marvin Attack (people.redhat.com)
in cryptography from tedu on 01 Oct 2023 18:28
comments (1)
Quantum Resistance and the Signal Protocol (signal.org)
in cryptography@lemmy.ml from Voyager@psychedelia.ink on 20 Sep 2023 09:43
comments (6)
How to Write a Secure JWT Library If You Absolutely Must (scottarc.blog)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 06 Sep 2023 11:29
comments (0)
AES: How to Design Secure Encryption (Spanning Tree) (piped.video)
in cryptography@lemmy.ml from Spzi@lemm.ee on 25 Aug 2023 18:41
comments (0)
Innovations in the AWS Database Encryption SDK (scottarc.blog)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 18 Aug 2023 10:48
comments (0)
TETRA Radio Code Encryption Has a Flaw: A Backdoor (www.wired.com)
in cryptography from tedu on 25 Jul 2023 17:32
comments (0)