Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Security Analysis of Forward Secure Log Sealing in Journald [pdf]
(
iacr.org
)
1 point
by
Phelinofist
5 days ago
|
past
|
discuss
A Comparative Security Analysis of Three Cloud-Based Password Managers [pdf]
(
iacr.org
)
1 point
by
Brajeshwar
7 days ago
|
past
|
discuss
A Comparative Security Analysis of Three Cloud-Based Password Managers
(
iacr.org
)
2 points
by
u1hcw9nx
7 days ago
|
past
|
1 comment
Vulnerabilities in cloud-based password managers [pdf]
(
iacr.org
)
5 points
by
leobdkr
7 days ago
|
past
|
2 comments
Zero Knowledge (About) Encryption: Security Analysis of Cloud Password Managers
(
iacr.org
)
3 points
by
gnabgib
8 days ago
|
past
|
discuss
False Assurance in Formally Verified Cryptographic Libraries
(
iacr.org
)
2 points
by
st_goliath
8 days ago
|
past
|
discuss
Zero Knowledge Encryption: Analysis of Three Cloud-based Password Managers
(
iacr.org
)
3 points
by
abiro
8 days ago
|
past
|
discuss
Ask Your Cryptographer If Context-Committing AEAD Is Right for You
(
iacr.org
)
1 point
by
u1hcw9nx
25 days ago
|
past
Break Me If You Can – Attacks Against 3DES/AES NFC Technologies
(
iacr.org
)
2 points
by
netsec_burn
30 days ago
|
past
Qurrency: A quantum-secure, private, and auditable platform for digital assets
(
iacr.org
)
1 point
by
shorsher
35 days ago
|
past
L for the Price of One: On the Benefits of Using more than t+1 Parties in Thres [pdf]
(
iacr.org
)
1 point
by
todsacerdoti
38 days ago
|
past
Parallelizable threshold ECDSA with more than t+1 parties
(
iacr.org
)
1 point
by
badcryptobitch
38 days ago
|
past
Hax: Verifying Security-Critical Rust Software Using Multiple Provers
(
iacr.org
)
2 points
by
forks
38 days ago
|
past
From collisions to chosen-prefix collisions, applied to full SHA-1 [pdf]
(
iacr.org
)
1 point
by
fanf2
61 days ago
|
past
|
1 comment
Ask Your Cryptographer If Context-Committing AEAD Is Right for You
(
iacr.org
)
3 points
by
nabla9
72 days ago
|
past
IACR 2025 election cannot be verified due to lost decryption key
(
iacr.org
)
2 points
by
T3OU-736
3 months ago
|
past
|
1 comment
IACR Election 2025 Update
(
iacr.org
)
6 points
by
layer8
3 months ago
|
past
International Crypto Association elections botched by loss of key
(
iacr.org
)
8 points
by
tomgag
3 months ago
|
past
|
3 comments
SoK: Blockchain Oracles Between Theory and Practice
(
iacr.org
)
1 point
by
altro
3 months ago
|
past
A Systematic Analysis of the Juniper Dual EC Incident (2016) [pdf]
(
iacr.org
)
2 points
by
mooreds
3 months ago
|
past
On the Distribution of the Distances of Random Words
(
iacr.org
)
3 points
by
quantumgarbage
3 months ago
|
past
|
1 comment
Security Mesh Monitoring Using Low-Cost, Embedded Time Domain Reflectometry
(
iacr.org
)
2 points
by
ahlCVA
4 months ago
|
past
Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical
(
iacr.org
)
1 point
by
nabla9
4 months ago
|
past
High-Throughput Universally Composable Threshold FHE Decryption
(
iacr.org
)
2 points
by
badcryptobitch
4 months ago
|
past
Practical seed recovery for the PCG pseudo-random number generator
(
iacr.org
)
3 points
by
fanf2
4 months ago
|
past
|
1 comment
Lookup Table Arguments Systematization of Knowledge
(
iacr.org
)
3 points
by
altro
4 months ago
|
past
Subverting Telegram's end-to-end encryption (2023)
(
iacr.org
)
105 points
by
pona-a
4 months ago
|
past
|
92 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir [pdf]
(
iacr.org
)
4 points
by
todsacerdoti
5 months ago
|
past
Camera Zoom Based Cipher Encryption Scheme or Strengthen Weak Encryption
(
iacr.org
)
4 points
by
gananthraman
5 months ago
|
past
Tlock: Practical timelock encryption from threshold BLS (2023) [pdf]
(
iacr.org
)
2 points
by
wslh
6 months ago
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: