Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Don't use Session – Round 2

Radical CS

Private Keys in the Fortigate Leak

Cracking a 512-bit DKIM key for less than $8 in the cloud

Verified post-quantum cryptography on the web

Denuvo Analysis

The GPU, not the TPM, is the root of hardware DRM

Post-quantum public-key encryption: what’s it all about?

crypto-bigint v0.6.0: a big integer library designed with constant-time algorithms for cryptography

Three mistakes from Dart/Flutter's weak PRNG

Colliding with the SHA prefix of Linux's initial Git commit

Sequoia PGP: A Sapling Matures: Meet sq 1.0

Post-Quantum Cryptography in Java

A Tour of WebAuthn

The long and winding road to safe browser-based cryptography

Show HN: PQC.club – Post-Quantum Cryptography Tools and Alternatives

AES-GCM and breaking it on nonce reuse

Australia Moves To Drop Some Cryptography By 2030

Dual_EC_DRBG with Justin Schuh and Matthew Green

Quantum Safe Cryptography in Go

Seeking Guidance on Cryptography

Key Transparency and the Right to Be Forgotten

HashML-DSA Considered Harmful

kcrypt2 - a retrospective and a lab notebook

Hyper-encryption [Provably unbreakable hyper-encryption in the limited access model]

Nothing-up-my-sleeve number

Known Attacks On Elliptic Curve Cryptography

Attestations: A new generation of signatures on PyPI

Beyond Bcrypt

Protecting Signal Keys on Desktop

More →