Hacker News new | past | comments | ask | show | jobs | submit | from login
Quantum One-Shot Signatures (iacr.org)
2 points by fbrusch 45 days ago | past
PQ-HPKE: Post-Quantum Hybrid Public Key Encryption (iacr.org)
1 point by teleforce 48 days ago | past
Pulsar: Secure Steganography for Diffusion Models (iacr.org)
41 points by aliventer 49 days ago | past | 3 comments
Provable Security of Linux-DRBG in the Seedless Robustness Model [pdf] (iacr.org)
43 points by zx2c4 54 days ago | past | 3 comments
Efficient Secret Sharing for Large-Scale Applications [pdf] (iacr.org)
5 points by hundredwatt 60 days ago | past
SoK: The Engineer's Guide to Post-Quantum Cryptography for Embedded Devices (iacr.org)
2 points by simonpure 67 days ago | past
RSA-Based Dynamic Accumulator Without Hashing into Primes (iacr.org)
2 points by simonpure 67 days ago | past
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM (iacr.org)
101 points by belter 72 days ago | past | 48 comments
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM (iacr.org)
1 point by speckx 73 days ago | past
Shufflecake: Plausible deniability for hidden filesystems on Linux (2023) (iacr.org)
66 points by simonpure 77 days ago | past | 23 comments
MIFARE Classic: exposing the static encrypted nonce variant [pdf] (iacr.org)
250 points by dave_universetf 86 days ago | past | 95 comments
The Impact of Time on DNS Security (2019) [pdf] (iacr.org)
3 points by indigodaddy 3 months ago | past
Safe curves for Elliptic Curve Cryptography [pdf] (iacr.org)
84 points by sebgan 3 months ago | past | 70 comments
A Formal Treatment of End-to-End Encrypted Cloud Storage [pdf] (iacr.org)
2 points by belter 3 months ago | past
Collision Attacks on Galois/Counter Mode (GCM) (iacr.org)
2 points by ementally 3 months ago | past
CHVote Protocol Specification (iacr.org)
1 point by simonpure 4 months ago | past
The impact of post-quantum TLS 1.3 on Time-To-Last-Byte of realworld connections (iacr.org)
1 point by belter 4 months ago | past
Asynchronous Consensus Without Trusted Setup or Public-Key Cryptography (iacr.org)
157 points by simonpure 4 months ago | past | 46 comments
Zombie: Middleboxes that Don't Snoop [pdf] (iacr.org)
1 point by skilled 4 months ago | past
Bruisable Onions: Anonymous Communication in the Asynchronous Model (iacr.org)
1 point by simonpure 5 months ago | past
Concurrently Secure Blind Schnorr Signatures (iacr.org)
1 point by janandonly 5 months ago | past
Knot-based Key Exchange protocol [pdf] (iacr.org)
1 point by g0xA52A2A 5 months ago | past
CHES 2024 crypto-engineering challenge (iacr.org)
2 points by p4bl0 5 months ago | past
Bolt: Privacy-Preserving, Accurate and Efficient Inference for Transformers (iacr.org)
1 point by simonpure 6 months ago | past
Quantum NV Sieve on Grover for Solving Shortest Vector Problem (iacr.org)
1 point by espressoshot 6 months ago | past
Asynchronous Consensus Without Trusted Setup or Public-Key Cryptography (iacr.org)
3 points by simonpure 6 months ago | past
Efficient Quantum Algorithm for Subset-Sum Problem (NP in BQP) (iacr.org)
1 point by Laaas 6 months ago | past | 1 comment
Efficient Quantum Algorithm for Subset-Sum Problem (iacr.org)
2 points by seasox 6 months ago | past
Towards Permissionless Consensus in the Standard Model (iacr.org)
1 point by kryster 6 months ago | past
Share with Care: Breaking E2EE in Nextcloud (iacr.org)
2 points by simonpure 6 months ago | past

Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: