For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
Lookup Table Arguments Systematization of Knowledge
(
iacr.org
)
3 points
by
altro
5 months ago
|
past
Subverting Telegram's end-to-end encryption (2023)
(
iacr.org
)
105 points
by
pona-a
5 months ago
|
past
|
92 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir [pdf]
(
iacr.org
)
4 points
by
todsacerdoti
6 months ago
|
past
Camera Zoom Based Cipher Encryption Scheme or Strengthen Weak Encryption
(
iacr.org
)
4 points
by
gananthraman
7 months ago
|
past
Tlock: Practical timelock encryption from threshold BLS (2023) [pdf]
(
iacr.org
)
2 points
by
wslh
7 months ago
|
past
Coral: Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs
(
iacr.org
)
1 point
by
petethomas
7 months ago
|
past
How to Prove False Statements: Practical Attacks on Fiat-Shamir
(
iacr.org
)
2 points
by
belter
8 months ago
|
past
Replication of Quantum Factorisation Records with a VIC-20, an Abacus, and a Dog
(
iacr.org
)
84 points
by
teddyh
8 months ago
|
past
|
25 comments
Replication of Quantum Factorisation Records; a Home Computer, Abacus, and a Dog
(
iacr.org
)
1 point
by
ChuckMcM
8 months ago
|
past
|
2 comments
Formal Security & Verification of Cryptographic Protocol Implementations in Rust
(
iacr.org
)
2 points
by
matt_d
8 months ago
|
past
Replication of Quantum Factorisation with an 8-Bit Computer, an Abacus and a Dog
(
iacr.org
)
3 points
by
indy
8 months ago
|
past
Replication of Quantum Factorisation Records with an 8-bit Home Computer [pdf]
(
iacr.org
)
137 points
by
sebgan
8 months ago
|
past
|
32 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir
(
iacr.org
)
6 points
by
Bluestein
8 months ago
|
past
Quantum Computing without the Linear Algebra [pdf]
(
iacr.org
)
2 points
by
adamnemecek
9 months ago
|
past
Quantum Computing without the Linear Algebra [pdf]
(
iacr.org
)
1 point
by
abhi9u
9 months ago
|
past
Quantum Computing without the Linear Algebra [pdf]
(
iacr.org
)
2 points
by
marvel_boy
9 months ago
|
past
AWS introduces key committing variant of XAES-256-GCM [pdf]
(
iacr.org
)
1 point
by
HillRat
11 months ago
|
past
OAuth Audience Injection Attacks [pdf]
(
iacr.org
)
1 point
by
mooreds
11 months ago
|
past
Traceable Verifiable Random Functions
(
iacr.org
)
2 points
by
wslh
11 months ago
|
past
Collisions for MD4, MD5, HAVAL-128 and RIPEMD (2004) [pdf]
(
iacr.org
)
2 points
by
kretaceous
11 months ago
|
past
Constant-time code: the pessimist's case
(
iacr.org
)
1 point
by
fanf2
12 months ago
|
past
Keying Merkle-Damgård at the Suffix
(
iacr.org
)
1 point
by
dchest
on March 19, 2025
|
past
GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and Tetra [pdf]
(
iacr.org
)
2 points
by
gnabgib
on March 17, 2025
|
past
Constant-Time Code: The Pessimist Case [pdf]
(
iacr.org
)
92 points
by
yuedongze
on March 9, 2025
|
past
|
66 comments
Constant-time coding is, or will soon become, infeasible in all generality [pdf]
(
iacr.org
)
1 point
by
jedisct1
on March 8, 2025
|
past
How to Prove False Statements: Practical Attacks on Fiat-Shamir
(
iacr.org
)
2 points
by
pbrowne011
on Jan 27, 2025
|
past
ColliderScript: Covenants in Bitcoin via 160-bit hash collisions
(
iacr.org
)
2 points
by
noch
on Jan 23, 2025
|
past
Approaches to Solving SVP in Lattice Cryptography with Quantum Gravity
(
iacr.org
)
1 point
by
noam_k
on Jan 13, 2025
|
past
CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust
(
iacr.org
)
1 point
by
EvgeniyZh
on Jan 13, 2025
|
past
Knot-based Key Exchange protocol
(
iacr.org
)
1 point
by
RadixDLT
on Dec 17, 2024
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.