| | A plea for lean software [pdf] (cr.yp.to) |
| 4 points by udev4096 on Oct 11, 2024 | past | 1 comment |
|
| | Libntruprime is a microlibrary for the Streamlined NTRU Prime cryptosyst (cr.yp.to) |
| 21 points by zdw on Aug 26, 2024 | past |
|
| | Clang vs. Clang (cr.yp.to) |
| 248 points by dchest on Aug 3, 2024 | past | 399 comments |
|
| | Plagiarism as a Patent Amplifier (cr.yp.to) |
| 2 points by Tomte on July 21, 2024 | past |
|
| | Abbreviating the stream-cipher discussions (2005) (cr.yp.to) |
| 1 point by rdpintqogeogsaa on July 12, 2024 | past |
|
| | Salsa20 ciphers in assembly for different architectures (cr.yp.to) |
| 2 points by jmspring on July 11, 2024 | past | 1 comment |
|
| | Invulnerable Software (2008) [pdf] (cr.yp.to) |
| 1 point by todsacerdoti on July 3, 2024 | past |
|
| | Bibliography keys: It's as easy as [1], [2], [3] (cr.yp.to) |
| 64 points by stargrave on June 12, 2024 | past | 27 comments |
|
| | CryptAttackTester: high-assurance attack analysis (cr.yp.to) |
| 1 point by skilled on June 11, 2024 | past | 1 comment |
|
| | UTC, Tai, and Unix Time (2001) (cr.yp.to) |
| 142 points by enz on May 9, 2024 | past | 141 comments |
|
| | How does DNS work? (2002) (cr.yp.to) |
| 16 points by 1vuio0pswjnm7 on April 5, 2024 | past | 13 comments |
|
| | Keep Secrets from Chrome [pdf] (cr.yp.to) |
| 1 point by weinzierl on March 25, 2024 | past |
|
| | Keep Secrets from Chrome [pdf] (cr.yp.to) |
| 1 point by weinzierl on March 24, 2024 | past |
|
| | NSA, NIST, and post-quantum cryptography (cr.yp.to) |
| 2 points by mfrw on March 9, 2024 | past | 1 comment |
|
| | A modest proposal for reducing mail traffic (1996) (cr.yp.to) |
| 13 points by Shugyousha on Feb 20, 2024 | past | 5 comments |
|
| | Niklaus Wirth – Plea for Lean Software (1995) [pdf] (cr.yp.to) |
| 4 points by dist-epoch on Feb 13, 2024 | past |
|
| | Two File Descriptors for Sockets (cr.yp.to) |
| 109 points by goranmoomin on Jan 22, 2024 | past | 65 comments |
|
| | Kyberslash: Division timings depending on secrets in Kyber software (cr.yp.to) |
| 1 point by jgeralnik on Jan 8, 2024 | past |
|
| | A Plea For Lean Software (1995) [pdf] (cr.yp.to) |
| 3 points by kaycebasques on Jan 3, 2024 | past |
|
| | Double encryption: Analyzing the NSA/GCHQ arguments against hybrids (cr.yp.to) |
| 171 points by weinzierl on Jan 2, 2024 | past | 56 comments |
|
| | Predicting performance for post-quantum encrypted-file systems [pdf] (cr.yp.to) |
| 1 point by nabla9 on Dec 7, 2023 | past |
|
| | Another way to botch the security analysis of Kyber-512 (cr.yp.to) |
| 16 points by todsacerdoti on Nov 25, 2023 | past | 2 comments |
|
| | Reducing "gate" counts for Kyber-512 contradicting NIST's calculation (cr.yp.to) |
| 30 points by nabla9 on Oct 23, 2023 | past | 7 comments |
|
| | Identifying the boundaries of acceptability for cryptographic standards: BADA55 (cr.yp.to) |
| 2 points by opengears on Oct 8, 2023 | past | 1 comment |
|
| | Debunking NIST's calculation of the Kyber-512 security level (cr.yp.to) |
| 468 points by bumbledraven on Oct 3, 2023 | past | 201 comments |
|
| | Boring Crypto (2015) [pdf] (cr.yp.to) |
| 70 points by fdeage on Sept 16, 2023 | past | 25 comments |
|
| | Papers with computer-checked proofs [pdf] (cr.yp.to) |
| 3 points by staunton on Sept 11, 2023 | past | 1 comment |
|
| | DJB: NSA's members of pqc nist.gov team: Nick Gajcowski; David Hubbard; etc (cr.yp.to) |
| 3 points by nabla9 on Sept 10, 2023 | past | 1 comment |
|
| | Papers with computer-checked proofs [pdf] (cr.yp.to) |
| 3 points by weinzierl on Sept 8, 2023 | past | 1 comment |
|
| | Untied Airlines: A Personal Perspective (cr.yp.to) |
| 2 points by rvrs on Aug 29, 2023 | past | 2 comments |
|
|
| More |