| | CVE-2020-0601: the ChainOfFools attack explained with PoC (kudelskisecurity.com) |
| 3 points by anomalroil on Jan 16, 2020 | past |
|
| | Forget Homomorphic Encryption, Here Comes Functional Encryption (kudelskisecurity.com) |
| 3 points by EvgeniyZh on Dec 3, 2019 | past |
|
| | Forget Homomorphic Encryption, Here Comes Functional Encryption (kudelskisecurity.com) |
| 3 points by wyldfire on Dec 2, 2019 | past |
|
| | Google, IBM, and the Quantum Supremacy Affair Explained (kudelskisecurity.com) |
| 1 point by kushti on Nov 29, 2019 | past |
|
| | Forget Homomorphic Encryption, Here Comes Functional Encryption (kudelskisecurity.com) |
| 6 points by anomalroil on Nov 26, 2019 | past | 1 comment |
|
| | FIDO2: Solving the Password Problem (kudelskisecurity.com) |
| 4 points by spiridow on Oct 8, 2019 | past | 1 comment |
|
| | Can You Sign a Quantum State? (kudelskisecurity.com) |
| 2 points by g0xA52A2A on May 21, 2019 | past |
|
| | Physically Unclonable Functions in Practice (kudelskisecurity.com) |
| 2 points by MrXOR on April 14, 2019 | past |
|
| | Auditing code for crypto flaws: the first 30 minutes (kudelskisecurity.com) |
| 1 point by JoachimS on Feb 8, 2019 | past |
|
| | Auditing Rust Crypto: The First Hours (kudelskisecurity.com) |
| 149 points by lwhsiao on Feb 7, 2019 | past | 86 comments |
|
| | Build Your Own Hardware Implant (kudelskisecurity.com) |
| 3 points by Jerry2 on Oct 25, 2018 | past |
|
| | Build your own hardware implant (kudelskisecurity.com) |
| 2 points by anomalroil on Oct 24, 2018 | past |
|
| | Open-source crypto is no better than closed-source crypto (kudelskisecurity.com) |
| 83 points by throwawaymath on Oct 3, 2018 | past | 58 comments |
|
| | Open-source crypto is no better than closed-source crypto (kudelskisecurity.com) |
| 1 point by Tomte on Oct 3, 2018 | past | 1 comment |
|
| | Open-source crypto is no better than closed-source crypto (kudelskisecurity.com) |
| 3 points by wrench4916 on Oct 2, 2018 | past |
|
| | Breaking RSA OAEP with Manger Attack (kudelskisecurity.com) |
| 11 points by anomalroil on April 11, 2018 | past | 1 comment |
|
| | Blockchains: How to Steal Millions in 2^64 Operations (kudelskisecurity.com) |
| 3 points by erwan on Jan 16, 2018 | past |
|
| | Algorithms can’t be patched (kudelskisecurity.com) |
| 2 points by okket on Dec 14, 2017 | past | 1 comment |
|
| | The making of Serious Cryptography (kudelskisecurity.com) |
| 2 points by jaybosamiya on Nov 16, 2017 | past |
|
| | On PGP cipher preferences and OpenPGP compliance (kudelskisecurity.com) |
| 2 points by ninegunpi on Oct 13, 2017 | past |
|
| | How to defeat Ed25519 and EdDSA using faults (kudelskisecurity.com) |
| 171 points by lisper on Oct 6, 2017 | past | 61 comments |
|
| | How to defeat Ed25519 and EdDSA using faults (kudelskisecurity.com) |
| 2 points by lisper on Oct 5, 2017 | past |
|
| | Improving the SPHINCS post-quantum signature scheme (kudelskisecurity.com) |
| 2 points by kushti on Sept 29, 2017 | past |
|
| | Technical analysis of the Equation Group's post-exploitation tools, Part 1 (kudelskisecurity.com) |
| 1 point by francisck on May 18, 2017 | past |
|
| | Configuring YubiKey for GPG and U2F (kudelskisecurity.com) |
| 3 points by dsr12 on April 28, 2017 | past | 1 comment |
|
| | Should Curve25519 keys be validated? (kudelskisecurity.com) |
| 18 points by zdw on April 25, 2017 | past | 4 comments |
|
| | Should ECDH keys be validated? (kudelskisecurity.com) |
| 2 points by dm on April 25, 2017 | past |
|
| | Auditing code for crypto flaws: the first 30 minutes (kudelskisecurity.com) |
| 1 point by remx on April 25, 2017 | past |
|
| | On CIA Crypto (kudelskisecurity.com) |
| 1 point by remx on March 15, 2017 | past |
|
| | On CIA Crypto (kudelskisecurity.com) |
| 1 point by eternalban on March 13, 2017 | past |
|
|
| More |