Frequently Asked Questions about FHE

Nadim Kobeissi's Applied Cryptography Course

A Wide Reduction Trick (2022)

Running a Certificate Transparency log

Applied Cryptography: comprehensive, novel course materials released under Creative Commons

CoverDrop: Blowing the Whistle Through A News App

RFC 9799: ACME Extensions for ".onion"

Quantum Scientists Have Built a New Math of Cryptography

Crypto 101 – Introductory course on cryptography (2017)

The State of Post-Quantum Cryptography (PQC) on the Web

Visual Cryptography in Rust

New blockchain Petoron Core (ADC). Proprietary architecture and cryptography. No API. No token. Just code and a proprietary P2P network.

Why Can't We Break Cryptography?

A deep-dive explainer on Ink and Switch's BeeKEM protocol

A deep-dive explainer on Ink and Switch's BeeKEM protocol

Spoofing OpenPGP.js signature verification

A bit more on Twitter/X's new encrypted messaging

Show HN: Ariadne – A Rust implementation of aperiodic cryptography

hcl - A high level cryptography library based on libsodium

Symbolic Memory with Read-Once Collapse Behavior for In-RAM Cryptography and Key Exchange

PAKE-Bench: Benchmarking OPAQUE, PAKE etc based off elliptic curve cryptography:  Critiques and Suggestions

1975 paper : Generators for Certain Alternating Groups With Applications to Cryptography

The cryptography behind passkeys

Post-quantum cryptography in OpenPGP

There Is No Diffie-Hellman but Elliptic Curve Diffie-Hellman

Tuscolo Static Certificate Transparency Log

Go’s FIPS 140-3 Compliance

Go Cryptography Security Audit

Forget IPs: using cryptography to verify bot and agent traffic

How Many Qubits Will It Take to Break Secure Public Key Cryptography Algorithms?

More →