Tomb, encrypting your precious data since 2007. Version 2.11 was just released.
(github.com)
in cryptography@lemmy.ml from setto@fed.dyne.org on 12 Jul 17:09
comments (0)
in cryptography@lemmy.ml from setto@fed.dyne.org on 12 Jul 17:09
comments (0)
A tool for encrypting files using puzzle based time-lock encryption and password
in cryptography@lemmy.ml from Super_gamer46861@lemmy.world on 07 Jul 08:20
comments (0)
in cryptography@lemmy.ml from Super_gamer46861@lemmy.world on 07 Jul 08:20
comments (0)
Multiple nations enact mysterious export controls on quantum computers
(www.newscientist.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 05 Jul 11:49
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 05 Jul 11:49
comments (0)
Javascript cryptography in the wild
(github.com)
in cryptography@lemmy.ml from positive_intentions@lemmy.ml on 14 Jun 2024 12:27
comments (2)
in cryptography@lemmy.ml from positive_intentions@lemmy.ml on 14 Jun 2024 12:27
comments (2)
AES-GCM and breaking it on nonce reuse
(frereit.de)
in cryptography from tedu on 12 Jun 2024 05:34
comments (0)
in cryptography from tedu on 12 Jun 2024 05:34
comments (0)
Attacking NIST SP 800-108 Key Derivation using Pseudorandom Functions
(scottarc.blog)
in cryptography from tedu on 07 Jun 2024 20:49
comments (0)
in cryptography from tedu on 07 Jun 2024 20:49
comments (0)
How to implement a secure Microsoft Recall alternative?
in cryptography@lemmy.ml from I_like_cats@lemmy.one on 07 Jun 2024 18:31
comments (12)
in cryptography@lemmy.ml from I_like_cats@lemmy.one on 07 Jun 2024 18:31
comments (12)
Randomness on Apple Platforms: "I’m sure the people working on this know what they’re doing, so it’s probably all very reasonable"
(blog.xoria.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 May 2024 13:35
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 May 2024 13:35
comments (0)
Keeping Secrets
(stanfordmag.org)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 29 Apr 2024 15:16
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 29 Apr 2024 15:16
comments (0)
Hatching Secret Sauce Eggs is a Rooster's Business
(neon.nightbulb.net)
in cryptography@lemmy.ml from firefly@neon.nightbulb.net on 15 Apr 2024 10:42
comments (0)
in cryptography@lemmy.ml from firefly@neon.nightbulb.net on 15 Apr 2024 10:42
comments (0)
A quick post on Chen’s algorithm
(blog.cryptographyengineering.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 17 Apr 2024 01:03
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 17 Apr 2024 01:03
comments (0)
Putty vulnerability: bias in ECDSA deterministic nonce generation leads to compromise of NIST P521 keys with ~60 signatures
(www.chiark.greenend.org.uk)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Apr 2024 20:25
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Apr 2024 20:25
comments (0)
Web-based cryptography is always snake oil
(www.devever.net)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 10 Apr 2024 02:03
comments (4)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 10 Apr 2024 02:03
comments (4)
SimpleX: adding quantum resistance to Signal double ratchet algorithm (with Streamlined NTRU Prime)
(simplex.chat)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 14 Mar 2024 15:29
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 14 Mar 2024 15:29
comments (0)
Security Cryptography Whatever - Post-Quantum iMessage with Douglas Stebila
(podcasts.google.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 04 Mar 2024 12:50
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 04 Mar 2024 12:50
comments (0)
Dice Random Numbers – Simon Josefsson's blog
(blog.josefsson.org)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 02 Mar 2024 19:11
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 02 Mar 2024 19:11
comments (0)
The Fi Virtual Carrier Network
(www.gstatic.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 21 Feb 2024 17:51
comments (1)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 21 Feb 2024 17:51
comments (1)
Backdoors that let cops decrypt messages violate human rights, EU court says
(arstechnica.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Feb 2024 18:35
comments (1)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 15 Feb 2024 18:35
comments (1)
Post-Quantum Cryptography For The Go Ecosystem
(words.filippo.io)
in cryptography from tedu on 31 Jan 2024 22:50
comments (2)
in cryptography from tedu on 31 Jan 2024 22:50
comments (2)
Unsigned Commits
(blog.glyph.im)
in versioncontrol from stsp on 25 Jan 2024 10:47
comments (0)
in versioncontrol from stsp on 25 Jan 2024 10:47
comments (0)
Attack of the week: Airdrop tracing
(blog.cryptographyengineering.com)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 12 Jan 2024 00:31
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 12 Jan 2024 00:31
comments (0)
KyberSlash: timing vulnerabilities allow recovering private keys in most Kyber implementations. patches available
(kyberslash.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 10 Jan 2024 10:47
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 10 Jan 2024 10:47
comments (0)
28 years later, ETSI's TETRA committee unanimously votes to open source their secret encryption algorithms
(www.theregister.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 16 Nov 2023 17:00
comments (2)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 16 Nov 2023 17:00
comments (2)
Passive SSH RSA Key Compromise via Lattices
(eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 Nov 2023 12:00
comments (1)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 06 Nov 2023 12:00
comments (1)
Nearly-finalized eIDAS legislation requires browsers to trust state-issued CAs, and prohibits using certificate transparency to prevent abuses of them: only ETSI-approved authenticity checks allowed.
(last-chance-for-eidas.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 02 Nov 2023 15:33
comments (1)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 02 Nov 2023 15:33
comments (1)
Crypto power to the people!
in cryptography@lemmy.ml from setto@fed.dyne.org on 01 Nov 2023 14:57
comments (2)
in cryptography@lemmy.ml from setto@fed.dyne.org on 01 Nov 2023 14:57
comments (2)
The inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level.
(blog.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 13 Oct 2023 10:49
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 13 Oct 2023 10:49
comments (0)
The Marvin Attack
(people.redhat.com)
in cryptography from tedu on 01 Oct 2023 18:28
comments (1)
in cryptography from tedu on 01 Oct 2023 18:28
comments (1)
Quantum Resistance and the Signal Protocol
(signal.org)
in cryptography@lemmy.ml from Voyager@psychedelia.ink on 20 Sep 2023 09:43
comments (6)
in cryptography@lemmy.ml from Voyager@psychedelia.ink on 20 Sep 2023 09:43
comments (6)
How to Write a Secure JWT Library If You Absolutely Must
(scottarc.blog)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 06 Sep 2023 11:29
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 06 Sep 2023 11:29
comments (0)
AES: How to Design Secure Encryption (Spanning Tree)
(piped.video)
in cryptography@lemmy.ml from Spzi@lemm.ee on 25 Aug 2023 18:41
comments (0)
in cryptography@lemmy.ml from Spzi@lemm.ee on 25 Aug 2023 18:41
comments (0)
Innovations in the AWS Database Encryption SDK
(scottarc.blog)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 18 Aug 2023 10:48
comments (0)
in cryptography@lemmy.ml from overflow64@lemmy.ml on 18 Aug 2023 10:48
comments (0)
TETRA Radio Code Encryption Has a Flaw: A Backdoor
(www.wired.com)
in cryptography from tedu on 25 Jul 2023 17:32
comments (0)
in cryptography from tedu on 25 Jul 2023 17:32
comments (0)