Hell is overconfident developers writing encryption code

Why cryptography is not based on NP-complete problems

A brief history of code signing at Mozilla

Three questions about Apple, encryption, and the U.K

Europol: Financial institutions should switch to quantum-safe cryptography

Tuta Launches Post Quantum Cryptography for Email (2024)

Best practices for key derivation

Don't use Session – Round 2

How we share secrets at a fully-remote startup

Radical CS

Private Keys in the Fortigate Leak

Cracking a 512-bit DKIM key for less than $8 in the cloud

Verified post-quantum cryptography on the web

EU's Digital Identity Systems - Reality Check and Techniques for Better Privacy

Denuvo Analysis

The GPU, not the TPM, is the root of hardware DRM

Post-quantum public-key encryption: what’s it all about?

crypto-bigint v0.6.0: a big integer library designed with constant-time algorithms for cryptography

Three mistakes from Dart/Flutter's weak PRNG

Colliding with the SHA prefix of Linux's initial Git commit

Sequoia PGP: A Sapling Matures: Meet sq 1.0

Post-Quantum Cryptography in Java

A Tour of WebAuthn

The long and winding road to safe browser-based cryptography

Show HN: PQC.club – Post-Quantum Cryptography Tools and Alternatives

AES-GCM and breaking it on nonce reuse

Australia Moves To Drop Some Cryptography By 2030

Dual_EC_DRBG with Justin Schuh and Matthew Green

Quantum Safe Cryptography in Go

Seeking Guidance on Cryptography

More →