Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Security Analysis of Forward Secure Log Sealing in Journald [pdf] (iacr.org)
1 point by Phelinofist 5 days ago | past | discuss
A Comparative Security Analysis of Three Cloud-Based Password Managers [pdf] (iacr.org)
1 point by Brajeshwar 7 days ago | past | discuss
A Comparative Security Analysis of Three Cloud-Based Password Managers (iacr.org)
2 points by u1hcw9nx 7 days ago | past | 1 comment
Vulnerabilities in cloud-based password managers [pdf] (iacr.org)
5 points by leobdkr 7 days ago | past | 2 comments
Zero Knowledge (About) Encryption: Security Analysis of Cloud Password Managers (iacr.org)
3 points by gnabgib 8 days ago | past | discuss
False Assurance in Formally Verified Cryptographic Libraries (iacr.org)
2 points by st_goliath 8 days ago | past | discuss
Zero Knowledge Encryption: Analysis of Three Cloud-based Password Managers (iacr.org)
3 points by abiro 8 days ago | past | discuss
Ask Your Cryptographer If Context-Committing AEAD Is Right for You (iacr.org)
1 point by u1hcw9nx 25 days ago | past
Break Me If You Can – Attacks Against 3DES/AES NFC Technologies (iacr.org)
2 points by netsec_burn 30 days ago | past
Qurrency: A quantum-secure, private, and auditable platform for digital assets (iacr.org)
1 point by shorsher 35 days ago | past
L for the Price of One: On the Benefits of Using more than t+1 Parties in Thres [pdf] (iacr.org)
1 point by todsacerdoti 38 days ago | past
Parallelizable threshold ECDSA with more than t+1 parties (iacr.org)
1 point by badcryptobitch 38 days ago | past
Hax: Verifying Security-Critical Rust Software Using Multiple Provers (iacr.org)
2 points by forks 38 days ago | past
From collisions to chosen-prefix collisions, applied to full SHA-1 [pdf] (iacr.org)
1 point by fanf2 61 days ago | past | 1 comment
Ask Your Cryptographer If Context-Committing AEAD Is Right for You (iacr.org)
3 points by nabla9 72 days ago | past
IACR 2025 election cannot be verified due to lost decryption key (iacr.org)
2 points by T3OU-736 3 months ago | past | 1 comment
IACR Election 2025 Update (iacr.org)
6 points by layer8 3 months ago | past
International Crypto Association elections botched by loss of key (iacr.org)
8 points by tomgag 3 months ago | past | 3 comments
SoK: Blockchain Oracles Between Theory and Practice (iacr.org)
1 point by altro 3 months ago | past
A Systematic Analysis of the Juniper Dual EC Incident (2016) [pdf] (iacr.org)
2 points by mooreds 3 months ago | past
On the Distribution of the Distances of Random Words (iacr.org)
3 points by quantumgarbage 3 months ago | past | 1 comment
Security Mesh Monitoring Using Low-Cost, Embedded Time Domain Reflectometry (iacr.org)
2 points by ahlCVA 4 months ago | past
Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical (iacr.org)
1 point by nabla9 4 months ago | past
High-Throughput Universally Composable Threshold FHE Decryption (iacr.org)
2 points by badcryptobitch 4 months ago | past
Practical seed recovery for the PCG pseudo-random number generator (iacr.org)
3 points by fanf2 4 months ago | past | 1 comment
Lookup Table Arguments Systematization of Knowledge (iacr.org)
3 points by altro 4 months ago | past
Subverting Telegram's end-to-end encryption (2023) (iacr.org)
105 points by pona-a 4 months ago | past | 92 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir [pdf] (iacr.org)
4 points by todsacerdoti 5 months ago | past
Camera Zoom Based Cipher Encryption Scheme or Strengthen Weak Encryption (iacr.org)
4 points by gananthraman 5 months ago | past
Tlock: Practical timelock encryption from threshold BLS (2023) [pdf] (iacr.org)
2 points by wslh 6 months ago | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: