Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
String comparison timing attacks in Go
(
kel.bz
)
1 point
by
kkl
46 days ago
|
past
Control planes are a useful concept
(
kel.bz
)
2 points
by
kkl
66 days ago
|
past
|
1 comment
Authenticated Dictionaries with Skip Lists and Commutative Hashing
(
kel.bz
)
3 points
by
kkl
on Jan 5, 2020
|
past
RSA-Based Key Encapsulation Mechanisms
(
kel.bz
)
1 point
by
kkl
on May 27, 2019
|
past
Building lattice reduction (LLL) intuition
(
kel.bz
)
81 points
by
kkl
on July 25, 2017
|
past
|
7 comments
The ggh cryptosystem
(
kel.bz
)
2 points
by
remx
on April 28, 2017
|
past
The Goldreich–Goldwasser–Halevi (GGH) Cryptosystem
(
kel.bz
)
2 points
by
kkl
on April 26, 2017
|
past
User-influenced os commands are still considered harmful
(
kel.bz
)
2 points
by
ergot
on Dec 7, 2016
|
past
Secure Password Hash Algorithm Migrations
(
kel.bz
)
3 points
by
kkl
on Nov 27, 2015
|
past
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: