Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
CVE-2020-0601: the ChainOfFools attack explained with PoC (kudelskisecurity.com)
3 points by anomalroil on Jan 16, 2020 | past
Forget Homomorphic Encryption, Here Comes Functional Encryption (kudelskisecurity.com)
3 points by EvgeniyZh on Dec 3, 2019 | past
Forget Homomorphic Encryption, Here Comes Functional Encryption (kudelskisecurity.com)
3 points by wyldfire on Dec 2, 2019 | past
Google, IBM, and the Quantum Supremacy Affair Explained (kudelskisecurity.com)
1 point by kushti on Nov 29, 2019 | past
Forget Homomorphic Encryption, Here Comes Functional Encryption (kudelskisecurity.com)
6 points by anomalroil on Nov 26, 2019 | past | 1 comment
FIDO2: Solving the Password Problem (kudelskisecurity.com)
4 points by spiridow on Oct 8, 2019 | past | 1 comment
Can You Sign a Quantum State? (kudelskisecurity.com)
2 points by g0xA52A2A on May 21, 2019 | past
Physically Unclonable Functions in Practice (kudelskisecurity.com)
2 points by MrXOR on April 14, 2019 | past
Auditing code for crypto flaws: the first 30 minutes (kudelskisecurity.com)
1 point by JoachimS on Feb 8, 2019 | past
Auditing Rust Crypto: The First Hours (kudelskisecurity.com)
149 points by lwhsiao on Feb 7, 2019 | past | 86 comments
Build Your Own Hardware Implant (kudelskisecurity.com)
3 points by Jerry2 on Oct 25, 2018 | past
Build your own hardware implant (kudelskisecurity.com)
2 points by anomalroil on Oct 24, 2018 | past
Open-source crypto is no better than closed-source crypto (kudelskisecurity.com)
83 points by throwawaymath on Oct 3, 2018 | past | 58 comments
Open-source crypto is no better than closed-source crypto (kudelskisecurity.com)
1 point by Tomte on Oct 3, 2018 | past | 1 comment
Open-source crypto is no better than closed-source crypto (kudelskisecurity.com)
3 points by wrench4916 on Oct 2, 2018 | past
Breaking RSA OAEP with Manger Attack (kudelskisecurity.com)
11 points by anomalroil on April 11, 2018 | past | 1 comment
Blockchains: How to Steal Millions in 2^64 Operations (kudelskisecurity.com)
3 points by erwan on Jan 16, 2018 | past
Algorithms can’t be patched (kudelskisecurity.com)
2 points by okket on Dec 14, 2017 | past | 1 comment
The making of Serious Cryptography (kudelskisecurity.com)
2 points by jaybosamiya on Nov 16, 2017 | past
On PGP cipher preferences and OpenPGP compliance (kudelskisecurity.com)
2 points by ninegunpi on Oct 13, 2017 | past
How to defeat Ed25519 and EdDSA using faults (kudelskisecurity.com)
171 points by lisper on Oct 6, 2017 | past | 61 comments
How to defeat Ed25519 and EdDSA using faults (kudelskisecurity.com)
2 points by lisper on Oct 5, 2017 | past
Improving the SPHINCS post-quantum signature scheme (kudelskisecurity.com)
2 points by kushti on Sept 29, 2017 | past
Technical analysis of the Equation Group's post-exploitation tools, Part 1 (kudelskisecurity.com)
1 point by francisck on May 18, 2017 | past
Configuring YubiKey for GPG and U2F (kudelskisecurity.com)
3 points by dsr12 on April 28, 2017 | past | 1 comment
Should Curve25519 keys be validated? (kudelskisecurity.com)
18 points by zdw on April 25, 2017 | past | 4 comments
Should ECDH keys be validated? (kudelskisecurity.com)
2 points by dm on April 25, 2017 | past
Auditing code for crypto flaws: the first 30 minutes (kudelskisecurity.com)
1 point by remx on April 25, 2017 | past
On CIA Crypto (kudelskisecurity.com)
1 point by remx on March 15, 2017 | past
On CIA Crypto (kudelskisecurity.com)
1 point by eternalban on March 13, 2017 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: