| | A Jq255 Elliptic Curve Specification, and a Retrospective (nccgroup.com) |
| 2 points by fanf2 on Nov 22, 2022 | past |
|
| | A jq255 Elliptic Curve Specification, and a Retrospective (nccgroup.com) |
| 1 point by rdpintqogeogsaa on Nov 21, 2022 | past |
|
| | A Guide to Improving Security Through Infrastructure-as-Code (nccgroup.com) |
| 3 points by mfrw on Sept 19, 2022 | past |
|
| | Constant time code in Common Lisp and Rust (nccgroup.com) |
| 5 points by detrist on Sept 9, 2022 | past |
|
| | Constant-Time Data Processing at a Secret Offset (nccgroup.com) |
| 3 points by dyrambic on Sept 6, 2022 | past |
|
| | Writing FreeBSD Kernel Modules in Rust (nccgroup.com) |
| 12 points by tlamponi on Sept 1, 2022 | past |
|
| | Writing FreeBSD Kernel Modules in Rust (nccgroup.com) |
| 6 points by amscotti on Sept 1, 2022 | past |
|
| | Writing FreeBSD Kernel Modules in Rust (nccgroup.com) |
| 4 points by digicatII on Aug 31, 2022 | past |
|
| | Implementation of the Castryck-Decru SIDH Attack in SageMath (nccgroup.com) |
| 1 point by jack4818 on Aug 8, 2022 | past |
|
| | Observations on selected NIST post-quantum algorithms from Thomas Pornin (nccgroup.com) |
| 1 point by justinludwig on July 30, 2022 | past |
|
| | Multiple vulnerabilities in Nuki smart locks (nccgroup.com) |
| 3 points by pentestercrab on July 25, 2022 | past |
|
| | Whitepaper – Practical Attacks on Machine Learning Systems (nccgroup.com) |
| 5 points by dchia on July 7, 2022 | past |
|
| | Multiple Vulnerabilities in U-Boot (nccgroup.com) |
| 3 points by mike_d on June 4, 2022 | past |
|
| | Technical Advisory – BLE Proximity Authentication Vulnerable to Relay Attacks (nccgroup.com) |
| 1 point by DyslexicAtheist on May 21, 2022 | past |
|
| | BLE Proximity Authentication Vulnerable to Relay Attacks (nccgroup.com) |
| 2 points by ctoth on May 18, 2022 | past |
|
| | Bluetooth relay attacks allow Tesla Model 3 / Y to be unlocked and driven away (nccgroup.com) |
| 233 points by youngtaff on May 17, 2022 | past | 247 comments |
|
| | Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks (nccgroup.com) |
| 2 points by duncans on May 16, 2022 | past | 1 comment |
|
| | CVE-2021-39137 – a Golang security bug that Rust would have prevented (nccgroup.com) |
| 4 points by el_duderino on Feb 7, 2022 | past |
|
| | Machine Learning for Static Analysis of Malware – Expansion of Research Scope (nccgroup.com) |
| 1 point by sjmulder on Jan 31, 2022 | past |
|
| | Real-world stories of how we’ve compromised CI/CD pipelines (nccgroup.com) |
| 265 points by usrme on Jan 17, 2022 | past | 117 comments |
|
| | Real-world stories of how we’ve compromised CI/CD pipelines (nccgroup.com) |
| 2 points by zdw on Jan 16, 2022 | past |
|
| | Real-world stories of how we’ve compromised CI/CD pipelines (nccgroup.com) |
| 4 points by aberoham on Jan 14, 2022 | past |
|
| | A Tour of Curve25519 in Erlang [pdf] (nccgroup.com) |
| 86 points by tosh on Dec 17, 2021 | past | 8 comments |
|
| | NCC Group’s Cryptopals Guided Tour (nccgroup.com) |
| 77 points by oconnor663 on Dec 10, 2021 | past | 11 comments |
|
| | “We wait, because we know you.” Inside the ransomware negotiation economics (nccgroup.com) |
| 3 points by bulla on Dec 1, 2021 | past |
|
| | An Illustrated Guide to Elliptic Curve Cryptography Validation (nccgroup.com) |
| 177 points by alanfranz on Nov 30, 2021 | past | 22 comments |
|
| | WhatsApp end-to-end encrypted backups security assessment (nccgroup.com) |
| 220 points by doublespeaking on Nov 10, 2021 | past | 118 comments |
|
| | Technical Advisory – Apple XAR – Arbitrary File Write (CVE-2021-30833) (nccgroup.com) |
| 3 points by todsacerdoti on Oct 29, 2021 | past |
|
| | The Challenges of Fuzzing 5G Protocols (nccgroup.com) |
| 5 points by todsacerdoti on Oct 19, 2021 | past |
|
| | Cracking Random Number Generators Using Machine Learning (nccgroup.com) |
| 169 points by Hard_Space on Oct 16, 2021 | past | 95 comments |
|
|
| More |