For the best experience on desktop, install the Chrome extension to track your reading on news.ycombinator.com
Hacker Newsnew | past | comments | ask | show | jobs | submit | history | fromregister
Lookup Table Arguments Systematization of Knowledge (iacr.org)
3 points by altro 5 months ago | past
Subverting Telegram's end-to-end encryption (2023) (iacr.org)
105 points by pona-a 5 months ago | past | 92 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir [pdf] (iacr.org)
4 points by todsacerdoti 6 months ago | past
Camera Zoom Based Cipher Encryption Scheme or Strengthen Weak Encryption (iacr.org)
4 points by gananthraman 7 months ago | past
Tlock: Practical timelock encryption from threshold BLS (2023) [pdf] (iacr.org)
2 points by wslh 7 months ago | past
Coral: Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs (iacr.org)
1 point by petethomas 7 months ago | past
How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org)
2 points by belter 8 months ago | past
Replication of Quantum Factorisation Records with a VIC-20, an Abacus, and a Dog (iacr.org)
84 points by teddyh 8 months ago | past | 25 comments
Replication of Quantum Factorisation Records; a Home Computer, Abacus, and a Dog (iacr.org)
1 point by ChuckMcM 8 months ago | past | 2 comments
Formal Security & Verification of Cryptographic Protocol Implementations in Rust (iacr.org)
2 points by matt_d 8 months ago | past
Replication of Quantum Factorisation with an 8-Bit Computer, an Abacus and a Dog (iacr.org)
3 points by indy 8 months ago | past
Replication of Quantum Factorisation Records with an 8-bit Home Computer [pdf] (iacr.org)
137 points by sebgan 8 months ago | past | 32 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org)
6 points by Bluestein 8 months ago | past
Quantum Computing without the Linear Algebra [pdf] (iacr.org)
2 points by adamnemecek 9 months ago | past
Quantum Computing without the Linear Algebra [pdf] (iacr.org)
1 point by abhi9u 9 months ago | past
Quantum Computing without the Linear Algebra [pdf] (iacr.org)
2 points by marvel_boy 9 months ago | past
AWS introduces key committing variant of XAES-256-GCM [pdf] (iacr.org)
1 point by HillRat 11 months ago | past
OAuth Audience Injection Attacks [pdf] (iacr.org)
1 point by mooreds 11 months ago | past
Traceable Verifiable Random Functions (iacr.org)
2 points by wslh 11 months ago | past
Collisions for MD4, MD5, HAVAL-128 and RIPEMD (2004) [pdf] (iacr.org)
2 points by kretaceous 11 months ago | past
Constant-time code: the pessimist's case (iacr.org)
1 point by fanf2 12 months ago | past
Keying Merkle-Damgård at the Suffix (iacr.org)
1 point by dchest on March 19, 2025 | past
GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and Tetra [pdf] (iacr.org)
2 points by gnabgib on March 17, 2025 | past
Constant-Time Code: The Pessimist Case [pdf] (iacr.org)
92 points by yuedongze on March 9, 2025 | past | 66 comments
Constant-time coding is, or will soon become, infeasible in all generality [pdf] (iacr.org)
1 point by jedisct1 on March 8, 2025 | past
How to Prove False Statements: Practical Attacks on Fiat-Shamir (iacr.org)
2 points by pbrowne011 on Jan 27, 2025 | past
ColliderScript: Covenants in Bitcoin via 160-bit hash collisions (iacr.org)
2 points by noch on Jan 23, 2025 | past
Approaches to Solving SVP in Lattice Cryptography with Quantum Gravity (iacr.org)
1 point by noam_k on Jan 13, 2025 | past
CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust (iacr.org)
1 point by EvgeniyZh on Jan 13, 2025 | past
Knot-based Key Exchange protocol (iacr.org)
1 point by RadixDLT on Dec 17, 2024 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search:

HN For You