Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

The cryptography behind passkeys

Tuscolo Static Certificate Transparency Log

Forget IPs: using cryptography to verify bot and agent traffic

Post-Quantum Cryptography on NetBSD

What the heck is AEAD again?

Audit of the Rust p256 Crate

When Gandhi met Satoshi

15,000 lines of verified cryptography now in Python

A New Kali Linux Archive Signing Key

McEliece standardization

The cryptoint library

Intuiting TLS

Cloudflare - Prepping for post-quantum: a beginner’s guide to lattice cryptography

Oracle: Preparing for Post Quantum Cryptography

Quantum-Safe Cryptography

Show HN: Signum – Kotlin Multiplatform Cryptography and PKI Library

Alkindi – Lightweight Post-Quantum Cryptography Library

Decoding the 90s: Cryptography in Early Software Development (2023)

Entropy Attacks

Chunking Attacks on File Backup Services Using Content-Defined Chunking [pdf]

Operationalizing Macaroons

CDC attack mitigation in Plakar

Zero-Knowledge Proofs

Chunking attacks on Tarsnap (and others)

Constant-Time Code: The Pessimist Case [pdf]

The Practical Limitations of End-to-End Encryption

How To Become A Hacker: A Step-By-Step Guide

Failing upwards: the Twitter encrypted DM failure

MLS is Coming to Wire App

Can I use Secure Curves in the Web Platform?

More →