Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Quantum One-Shot Signatures
(
iacr.org
)
2 points
by
fbrusch
39 days ago
|
past
PQ-HPKE: Post-Quantum Hybrid Public Key Encryption
(
iacr.org
)
1 point
by
teleforce
43 days ago
|
past
Pulsar: Secure Steganography for Diffusion Models
(
iacr.org
)
41 points
by
aliventer
44 days ago
|
past
|
3 comments
Provable Security of Linux-DRBG in the Seedless Robustness Model [pdf]
(
iacr.org
)
43 points
by
zx2c4
49 days ago
|
past
|
3 comments
Efficient Secret Sharing for Large-Scale Applications [pdf]
(
iacr.org
)
5 points
by
hundredwatt
55 days ago
|
past
SoK: The Engineer's Guide to Post-Quantum Cryptography for Embedded Devices
(
iacr.org
)
2 points
by
simonpure
62 days ago
|
past
RSA-Based Dynamic Accumulator Without Hashing into Primes
(
iacr.org
)
2 points
by
simonpure
62 days ago
|
past
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM
(
iacr.org
)
101 points
by
belter
67 days ago
|
past
|
48 comments
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM
(
iacr.org
)
1 point
by
speckx
67 days ago
|
past
Shufflecake: Plausible deniability for hidden filesystems on Linux (2023)
(
iacr.org
)
66 points
by
simonpure
72 days ago
|
past
|
23 comments
MIFARE Classic: exposing the static encrypted nonce variant [pdf]
(
iacr.org
)
250 points
by
dave_universetf
80 days ago
|
past
|
95 comments
The Impact of Time on DNS Security (2019) [pdf]
(
iacr.org
)
3 points
by
indigodaddy
84 days ago
|
past
Safe curves for Elliptic Curve Cryptography [pdf]
(
iacr.org
)
84 points
by
sebgan
85 days ago
|
past
|
70 comments
A Formal Treatment of End-to-End Encrypted Cloud Storage [pdf]
(
iacr.org
)
2 points
by
belter
3 months ago
|
past
Collision Attacks on Galois/Counter Mode (GCM)
(
iacr.org
)
2 points
by
ementally
3 months ago
|
past
CHVote Protocol Specification
(
iacr.org
)
1 point
by
simonpure
4 months ago
|
past
The impact of post-quantum TLS 1.3 on Time-To-Last-Byte of realworld connections
(
iacr.org
)
1 point
by
belter
4 months ago
|
past
Asynchronous Consensus Without Trusted Setup or Public-Key Cryptography
(
iacr.org
)
157 points
by
simonpure
4 months ago
|
past
|
46 comments
Zombie: Middleboxes that Don't Snoop [pdf]
(
iacr.org
)
1 point
by
skilled
4 months ago
|
past
Bruisable Onions: Anonymous Communication in the Asynchronous Model
(
iacr.org
)
1 point
by
simonpure
4 months ago
|
past
Concurrently Secure Blind Schnorr Signatures
(
iacr.org
)
1 point
by
janandonly
4 months ago
|
past
Knot-based Key Exchange protocol [pdf]
(
iacr.org
)
1 point
by
g0xA52A2A
5 months ago
|
past
CHES 2024 crypto-engineering challenge
(
iacr.org
)
2 points
by
p4bl0
5 months ago
|
past
Bolt: Privacy-Preserving, Accurate and Efficient Inference for Transformers
(
iacr.org
)
1 point
by
simonpure
5 months ago
|
past
Quantum NV Sieve on Grover for Solving Shortest Vector Problem
(
iacr.org
)
1 point
by
espressoshot
5 months ago
|
past
Asynchronous Consensus Without Trusted Setup or Public-Key Cryptography
(
iacr.org
)
3 points
by
simonpure
6 months ago
|
past
Efficient Quantum Algorithm for Subset-Sum Problem (NP in BQP)
(
iacr.org
)
1 point
by
Laaas
6 months ago
|
past
|
1 comment
Efficient Quantum Algorithm for Subset-Sum Problem
(
iacr.org
)
2 points
by
seasox
6 months ago
|
past
Towards Permissionless Consensus in the Standard Model
(
iacr.org
)
1 point
by
kryster
6 months ago
|
past
Share with Care: Breaking E2EE in Nextcloud
(
iacr.org
)
2 points
by
simonpure
6 months ago
|
past
More
Consider applying for YC's W25 batch! Applications are open till Nov 12.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: