Using SMT Solvers to Automate Chosen Ciphertext Attacks

The privacy of the TLS 1.3 protocol

Key Extraction Using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs

A Note on SIMON-32/64 Security

On Post-Compromise Security

From Collisions to Chosen-Prefix Collisions Application to Full SHA-1

Security vulnerability in TLS 1.3 PSK mode?

Securing Update Propagation with Homomorphic Hashing

Disco: Modern Session Encryption

Fully Bideniable Interactive Encryption

The 9 Lives of Bleichenbacher’s CAT: New Cache Attacks on TLS Implementations

ProtonMail Webmail does not provide end-to-end encryption

The OCB2 block cipher (ISO standard) has been broken

On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees

Cryptography during the French and American wars in Vietnam

Enabling Decentralized Private Computation

Leakage-Resilient Client-Side Deduplication of Encrypted Data in Cloud Storage

EPIC: Efficient Private Image Classification (or: Learning from the Masters)

Primality Testing Under Adversarial Conditions

Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ

Xoodoo cookbook

Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure

HPolyC: length-preserving encryption for entry-level processors

Zipf’s Law in Passwords

uMine: a Blockchain based on Human Miners

Practical Accountability of Secret Processes

Public Accountability vs. Secret Laws: Can They Coexist?

Efficient Logistic Regression on Large Encrypted Data

Ramanujan graphs in cryptography

Ledger Language Design: Designing and Deploying Formally Verified Public Ledgers

More →