GOLDILOCKER Brain Wallet - Generate OpenSSL Goldilocks Elliptic Curve Keys from Seed Phrase
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 23:45
comments (0)
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 23:45
comments (0)
KSRNG - Key Strike Random Generator (version 0.0.1)
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 23:29
comments (0)
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 23:29
comments (0)
MEGARAND Extreme Overkill Random Seed Generator
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 23:27
comments (2)
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 23:27
comments (2)
Cryptologue Arcade - Crypto Darkpaper - Crypto Color Prints - Simplementation Scheme : A Color-Coded Method For Indexing Research and Documentation
in cryptography@lemmy.ml from octade@soc.octade.net on 15 Dec 14:25
comments (0)
in cryptography@lemmy.ml from octade@soc.octade.net on 15 Dec 14:25
comments (0)
Hexlish Alphabet for English, Constructed Languages and Cryptography: Automatic, Structural Compression with a Phonetic Hexadecimal Alphabet
in cryptography@lemmy.ml from octade@soc.octade.net on 15 Dec 14:17
comments (0)
in cryptography@lemmy.ml from octade@soc.octade.net on 15 Dec 14:17
comments (0)
LatticeGen: how to hide LLM conversations for Privacy-Aware Cloud AI
(arxiv.org)
in cryptography@lemmy.ml from jaromil@fed.dyne.org on 04 Nov 2024 14:43
comments (0)
in cryptography@lemmy.ml from jaromil@fed.dyne.org on 04 Nov 2024 14:43
comments (0)
"The sins of the 90s": Questioning a puzzling claim by Meredith Whittaker about mass surveillance
(blog.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 29 Oct 2024 16:58
comments (1)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 29 Oct 2024 16:58
comments (1)
NIST Announces 14 Candidates to Advance to the Second Round of the Additional Digital Signatures for the Post-Quantum Cryptography Standardization Process
(csrc.nist.gov)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 25 Oct 2024 13:02
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 25 Oct 2024 13:02
comments (0)
[Idea] FHE-RAM-based message routing
in cryptography@lemmy.ml from pancake@lemmygrad.ml on 30 Aug 2024 08:18
comments (0)
in cryptography@lemmy.ml from pancake@lemmygrad.ml on 30 Aug 2024 08:18
comments (0)
NSA's influence on cryptographic standards (slides from a 2022 talk by D. J. Bernstein)
(cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 26 Aug 2024 21:40
comments (3)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 26 Aug 2024 21:40
comments (3)
Public Key Cryptography - Computerphile
(www.youtube.com)
in cryptography@lemmy.ml from yo_scottie_oh@lemmy.ml on 26 Aug 2024 21:05
comments (0)
in cryptography@lemmy.ml from yo_scottie_oh@lemmy.ml on 26 Aug 2024 21:05
comments (0)
Encrypted P2P Chat
(chat.positive-intentions.com)
in cryptography@lemmy.ml from positive_intentions@lemmy.ml on 19 Aug 2024 21:46
comments (17)
in cryptography@lemmy.ml from positive_intentions@lemmy.ml on 19 Aug 2024 21:46
comments (17)
Bernstein and Lange -- Safe curves for Elliptic Curve Cryptography [pdf]
(eprint.iacr.org)
in cryptography@lemmy.ml from solrize@lemmy.world on 14 Aug 2024 09:27
comments (3)
in cryptography@lemmy.ml from solrize@lemmy.world on 14 Aug 2024 09:27
comments (3)
The government unveils its quantum counter-weapons
(www.politico.com)
in cryptography@lemmy.ml from solrize@lemmy.world on 14 Aug 2024 00:00
comments (2)
in cryptography@lemmy.ml from solrize@lemmy.world on 14 Aug 2024 00:00
comments (2)
badkeys.info - checking cryptographic public keys for known vulnerabilities
(badkeys.info)
in cryptography@lemmy.ml from hanno@lemmy.world on 31 Jul 2024 08:59
comments (0)
in cryptography@lemmy.ml from hanno@lemmy.world on 31 Jul 2024 08:59
comments (0)
Tomb, encrypting your precious data since 2007. Version 2.11 was just released.
(github.com)
in cryptography@lemmy.ml from setto@fed.dyne.org on 12 Jul 2024 17:09
comments (0)
in cryptography@lemmy.ml from setto@fed.dyne.org on 12 Jul 2024 17:09
comments (0)
A tool for encrypting files using puzzle based time-lock encryption and password
in cryptography@lemmy.ml from Super_gamer46861@lemmy.world on 07 Jul 2024 08:20
comments (0)
in cryptography@lemmy.ml from Super_gamer46861@lemmy.world on 07 Jul 2024 08:20
comments (0)
Multiple nations enact mysterious export controls on quantum computers
(www.newscientist.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 05 Jul 2024 11:49
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 05 Jul 2024 11:49
comments (0)
Javascript cryptography in the wild
(github.com)
in cryptography@lemmy.ml from positive_intentions@lemmy.ml on 14 Jun 2024 12:27
comments (2)
in cryptography@lemmy.ml from positive_intentions@lemmy.ml on 14 Jun 2024 12:27
comments (2)
AES-GCM and breaking it on nonce reuse
(frereit.de)
in cryptography from tedu on 12 Jun 2024 05:34
comments (0)
in cryptography from tedu on 12 Jun 2024 05:34
comments (0)
Attacking NIST SP 800-108 Key Derivation using Pseudorandom Functions
(scottarc.blog)
in cryptography from tedu on 07 Jun 2024 20:49
comments (0)
in cryptography from tedu on 07 Jun 2024 20:49
comments (0)
How to implement a secure Microsoft Recall alternative?
in cryptography@lemmy.ml from I_like_cats@lemmy.one on 07 Jun 2024 18:31
comments (12)
in cryptography@lemmy.ml from I_like_cats@lemmy.one on 07 Jun 2024 18:31
comments (12)
Randomness on Apple Platforms: "I’m sure the people working on this know what they’re doing, so it’s probably all very reasonable"
(blog.xoria.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 May 2024 13:35
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 May 2024 13:35
comments (0)
Keeping Secrets
(stanfordmag.org)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 29 Apr 2024 15:16
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 29 Apr 2024 15:16
comments (0)
Hatching Secret Sauce Eggs is a Rooster's Business
(neon.nightbulb.net)
in cryptography@lemmy.ml from firefly@neon.nightbulb.net on 15 Apr 2024 10:42
comments (0)
in cryptography@lemmy.ml from firefly@neon.nightbulb.net on 15 Apr 2024 10:42
comments (0)
A quick post on Chen’s algorithm
(blog.cryptographyengineering.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 17 Apr 2024 01:03
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 17 Apr 2024 01:03
comments (0)
Putty vulnerability: bias in ECDSA deterministic nonce generation leads to compromise of NIST P521 keys with ~60 signatures
(www.chiark.greenend.org.uk)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Apr 2024 20:25
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Apr 2024 20:25
comments (0)
Web-based cryptography is always snake oil
(www.devever.net)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 10 Apr 2024 02:03
comments (4)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 10 Apr 2024 02:03
comments (4)
SimpleX: adding quantum resistance to Signal double ratchet algorithm (with Streamlined NTRU Prime)
(simplex.chat)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 14 Mar 2024 15:29
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 14 Mar 2024 15:29
comments (0)
Security Cryptography Whatever - Post-Quantum iMessage with Douglas Stebila
(podcasts.google.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 04 Mar 2024 12:50
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 04 Mar 2024 12:50
comments (0)
Dice Random Numbers – Simon Josefsson's blog
(blog.josefsson.org)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 02 Mar 2024 19:11
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 02 Mar 2024 19:11
comments (0)
The Fi Virtual Carrier Network
(www.gstatic.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 21 Feb 2024 17:51
comments (1)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 21 Feb 2024 17:51
comments (1)
Backdoors that let cops decrypt messages violate human rights, EU court says
(arstechnica.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Feb 2024 18:35
comments (1)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Feb 2024 18:35
comments (1)
Post-Quantum Cryptography For The Go Ecosystem
(words.filippo.io)
in cryptography from tedu on 31 Jan 2024 22:50
comments (2)
in cryptography from tedu on 31 Jan 2024 22:50
comments (2)
Unsigned Commits
(blog.glyph.im)
in versioncontrol from stsp on 25 Jan 2024 10:47
comments (0)
in versioncontrol from stsp on 25 Jan 2024 10:47
comments (0)
Attack of the week: Airdrop tracing
(blog.cryptographyengineering.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 12 Jan 2024 00:31
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 12 Jan 2024 00:31
comments (0)
KyberSlash: timing vulnerabilities allow recovering private keys in most Kyber implementations. patches available
(kyberslash.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 10 Jan 2024 10:47
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 10 Jan 2024 10:47
comments (0)
28 years later, ETSI's TETRA committee unanimously votes to open source their secret encryption algorithms
(www.theregister.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 16 Nov 2023 17:00
comments (2)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 16 Nov 2023 17:00
comments (2)
Passive SSH RSA Key Compromise via Lattices
(eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 Nov 2023 12:00
comments (1)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 Nov 2023 12:00
comments (1)
Nearly-finalized eIDAS legislation requires browsers to trust state-issued CAs, and prohibits using certificate transparency to prevent abuses of them: only ETSI-approved authenticity checks allowed.
(last-chance-for-eidas.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 02 Nov 2023 15:33
comments (1)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 02 Nov 2023 15:33
comments (1)
Crypto power to the people!
in cryptography@lemmy.ml from setto@fed.dyne.org on 01 Nov 2023 14:57
comments (2)
in cryptography@lemmy.ml from setto@fed.dyne.org on 01 Nov 2023 14:57
comments (2)
The inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level.
(blog.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 13 Oct 2023 10:49
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 13 Oct 2023 10:49
comments (0)
The Marvin Attack
(people.redhat.com)
in cryptography from tedu on 01 Oct 2023 18:28
comments (1)
in cryptography from tedu on 01 Oct 2023 18:28
comments (1)
Quantum Resistance and the Signal Protocol
(signal.org)
in cryptography@lemmy.ml from Voyager@psychedelia.ink on 20 Sep 2023 09:43
comments (6)
in cryptography@lemmy.ml from Voyager@psychedelia.ink on 20 Sep 2023 09:43
comments (6)
How to Write a Secure JWT Library If You Absolutely Must
(scottarc.blog)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 06 Sep 2023 11:29
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 06 Sep 2023 11:29
comments (0)
AES: How to Design Secure Encryption (Spanning Tree)
(piped.video)
in cryptography@lemmy.ml from Spzi@lemm.ee on 25 Aug 2023 18:41
comments (0)
in cryptography@lemmy.ml from Spzi@lemm.ee on 25 Aug 2023 18:41
comments (0)
Innovations in the AWS Database Encryption SDK
(scottarc.blog)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 18 Aug 2023 10:48
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 18 Aug 2023 10:48
comments (0)
TETRA Radio Code Encryption Has a Flaw: A Backdoor
(www.wired.com)
in cryptography from tedu on 25 Jul 2023 17:32
comments (0)
in cryptography from tedu on 25 Jul 2023 17:32
comments (0)