Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Ed25519 Support in Chrome: Making the Web Faster and Safer

Improving Geographical Resilience for Distributed Open Source Teams with Freon

Improving Geographical Resilience For Distributed Open Source Teams with FREON

ChaCha12-BLAKE3: Secure, Simple and Fast authenticated and committing encryption

OpenSSH Post-Quantum Cryptography

NIST Finalizes 'Lightweight Cryptography' Standard to Protect Small Devices

Reticulum 1.0.0 The cryptography-based networking stack

Is post quantum cryptography for iot devices a good topic for reasearch for a beginner computer science student?

Neurocipher: Python project combining cryptography and Hopfield networks

Encrypting files with passkeys and age

Encrypting Files with Passkeys and Age

The FIPS 140-3 Go Cryptographic Module

Age verification doesn't need to be a privacy footgun

How to prove false statements: Practical attacks on Fiat-Shamir

Announcing FOKS, the Federated Open Key Service

Computer Scientists Figure Out How to Prove Lies

Frequently Asked Questions about FHE

Nadim Kobeissi's Applied Cryptography Course

A Wide Reduction Trick (2022)

Running a Certificate Transparency log

Applied Cryptography: comprehensive, novel course materials released under Creative Commons

CoverDrop: Blowing the Whistle Through A News App

RFC 9799: ACME Extensions for ".onion"

Quantum Scientists Have Built a New Math of Cryptography

Crypto 101 – Introductory course on cryptography (2017)

The State of Post-Quantum Cryptography (PQC) on the Web

Visual Cryptography in Rust

New blockchain Petoron Core (ADC). Proprietary architecture and cryptography. No API. No token. Just code and a proprietary P2P network.

Why Can't We Break Cryptography?

A deep-dive explainer on Ink and Switch's BeeKEM protocol

More →