Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Signal Secure Backups

How to Prove False Statements: Practical Attacks on Fiat-Shamir

Local-first access control

Replacing SGX with GitHub Actions: Or how to turn GitHub Actions into a trusted computing oracle

A cryptography expert on how Web3 started, and how it’s going

Cryptography can't be stopped

Barking Up the Ratchet Tree – MLS Is Neither Royal nor Nude

“This telegram must be closely paraphrased before being communicated to anyone”

Understanding Diffie-Hellman with Clocks

snuffle / salsa / chacha

Inspecting OpenPGP certificates

NOPE: Strengthening Domain Authentication (RWC 2025)

Improving Geographical Resilience for Distributed Open Source Teams with Freon

Improving Geographical Resilience For Distributed Open Source Teams with FREON

Ed25519 Support in Chrome: Making the Web Faster and Safer

ChaCha12-BLAKE3: Secure, Simple and Fast authenticated and committing encryption

OpenSSH Post-Quantum Cryptography

NIST Finalizes 'Lightweight Cryptography' Standard to Protect Small Devices

Mastering Bitcoin – Asymmetric Cryptography, Keys & Wallets

Reticulum 1.0.0 The cryptography-based networking stack

Sharing a personal new cryptography paradigm experiment: Dynamic Abstraction Cryptography + Kraken-GS implementation in C

Is post quantum cryptography for iot devices a good topic for reasearch for a beginner computer science student?

Neurocipher: Python project combining cryptography and Hopfield networks

Encrypting files with passkeys and age

Encrypting Files with Passkeys and Age

The FIPS 140-3 Go Cryptographic Module

Age verification doesn't need to be a privacy footgun

How to prove false statements: Practical attacks on Fiat-Shamir

Announcing FOKS, the Federated Open Key Service

Computer Scientists Figure Out How to Prove Lies

More →