Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
String comparison timing attacks in Go (kel.bz)
1 point by kkl 46 days ago | past
Control planes are a useful concept (kel.bz)
2 points by kkl 66 days ago | past | 1 comment
Authenticated Dictionaries with Skip Lists and Commutative Hashing (kel.bz)
3 points by kkl on Jan 5, 2020 | past
RSA-Based Key Encapsulation Mechanisms (kel.bz)
1 point by kkl on May 27, 2019 | past
Building lattice reduction (LLL) intuition (kel.bz)
81 points by kkl on July 25, 2017 | past | 7 comments
The ggh cryptosystem (kel.bz)
2 points by remx on April 28, 2017 | past
The Goldreich–Goldwasser–Halevi (GGH) Cryptosystem (kel.bz)
2 points by kkl on April 26, 2017 | past
User-influenced os commands are still considered harmful (kel.bz)
2 points by ergot on Dec 7, 2016 | past
Secure Password Hash Algorithm Migrations (kel.bz)
3 points by kkl on Nov 27, 2015 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: