Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
A Jq255 Elliptic Curve Specification, and a Retrospective (nccgroup.com)
2 points by fanf2 on Nov 22, 2022 | past
A jq255 Elliptic Curve Specification, and a Retrospective (nccgroup.com)
1 point by rdpintqogeogsaa on Nov 21, 2022 | past
A Guide to Improving Security Through Infrastructure-as-Code (nccgroup.com)
3 points by mfrw on Sept 19, 2022 | past
Constant time code in Common Lisp and Rust (nccgroup.com)
5 points by detrist on Sept 9, 2022 | past
Constant-Time Data Processing at a Secret Offset (nccgroup.com)
3 points by dyrambic on Sept 6, 2022 | past
Writing FreeBSD Kernel Modules in Rust (nccgroup.com)
12 points by tlamponi on Sept 1, 2022 | past
Writing FreeBSD Kernel Modules in Rust (nccgroup.com)
6 points by amscotti on Sept 1, 2022 | past
Writing FreeBSD Kernel Modules in Rust (nccgroup.com)
4 points by digicatII on Aug 31, 2022 | past
Implementation of the Castryck-Decru SIDH Attack in SageMath (nccgroup.com)
1 point by jack4818 on Aug 8, 2022 | past
Observations on selected NIST post-quantum algorithms from Thomas Pornin (nccgroup.com)
1 point by justinludwig on July 30, 2022 | past
Multiple vulnerabilities in Nuki smart locks (nccgroup.com)
3 points by pentestercrab on July 25, 2022 | past
Whitepaper – Practical Attacks on Machine Learning Systems (nccgroup.com)
5 points by dchia on July 7, 2022 | past
Multiple Vulnerabilities in U-Boot (nccgroup.com)
3 points by mike_d on June 4, 2022 | past
Technical Advisory – BLE Proximity Authentication Vulnerable to Relay Attacks (nccgroup.com)
1 point by DyslexicAtheist on May 21, 2022 | past
BLE Proximity Authentication Vulnerable to Relay Attacks (nccgroup.com)
2 points by ctoth on May 18, 2022 | past
Bluetooth relay attacks allow Tesla Model 3 / Y to be unlocked and driven away (nccgroup.com)
233 points by youngtaff on May 17, 2022 | past | 247 comments
Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks (nccgroup.com)
2 points by duncans on May 16, 2022 | past | 1 comment
CVE-2021-39137 – a Golang security bug that Rust would have prevented (nccgroup.com)
4 points by el_duderino on Feb 7, 2022 | past
Machine Learning for Static Analysis of Malware – Expansion of Research Scope (nccgroup.com)
1 point by sjmulder on Jan 31, 2022 | past
Real-world stories of how we’ve compromised CI/CD pipelines (nccgroup.com)
265 points by usrme on Jan 17, 2022 | past | 117 comments
Real-world stories of how we’ve compromised CI/CD pipelines (nccgroup.com)
2 points by zdw on Jan 16, 2022 | past
Real-world stories of how we’ve compromised CI/CD pipelines (nccgroup.com)
4 points by aberoham on Jan 14, 2022 | past
A Tour of Curve25519 in Erlang [pdf] (nccgroup.com)
86 points by tosh on Dec 17, 2021 | past | 8 comments
NCC Group’s Cryptopals Guided Tour (nccgroup.com)
77 points by oconnor663 on Dec 10, 2021 | past | 11 comments
“We wait, because we know you.” Inside the ransomware negotiation economics (nccgroup.com)
3 points by bulla on Dec 1, 2021 | past
An Illustrated Guide to Elliptic Curve Cryptography Validation (nccgroup.com)
177 points by alanfranz on Nov 30, 2021 | past | 22 comments
WhatsApp end-to-end encrypted backups security assessment (nccgroup.com)
220 points by doublespeaking on Nov 10, 2021 | past | 118 comments
Technical Advisory – Apple XAR – Arbitrary File Write (CVE-2021-30833) (nccgroup.com)
3 points by todsacerdoti on Oct 29, 2021 | past
The Challenges of Fuzzing 5G Protocols (nccgroup.com)
5 points by todsacerdoti on Oct 19, 2021 | past
Cracking Random Number Generators Using Machine Learning (nccgroup.com)
169 points by Hard_Space on Oct 16, 2021 | past | 95 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: