For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
How could ECDSA be broken through Shor's Algorithm? (2023)
(
crypto.stackexchange.com
)
1 point
by
lawrenceyan
8 months ago
|
past
What is the use of Mersenne Primes in cryptography?
(
crypto.stackexchange.com
)
1 point
by
nomilk
on Oct 19, 2024
|
past
Could celestial objects be used in cryptography?
(
crypto.stackexchange.com
)
2 points
by
wslh
on May 13, 2024
|
past
ELI5 Post Quantum Kyber Encryption Algorithm
(
crypto.stackexchange.com
)
3 points
by
ggasp
on Feb 25, 2024
|
past
Are RSA signatures distinguishable from random data?
(
crypto.stackexchange.com
)
1 point
by
susam
on Dec 26, 2023
|
past
Are curve secp256k1 ECDSA signatures distinguishable from random data?
(
crypto.stackexchange.com
)
2 points
by
tosh
on Nov 22, 2023
|
past
Can you use memory errors as a source of randomness for cryptography?
(
crypto.stackexchange.com
)
1 point
by
notpushkin
on Sept 4, 2023
|
past
Largest integer factored by Shor's algorithm?
(
crypto.stackexchange.com
)
2 points
by
qsantos
on July 11, 2023
|
past
Can an AI generate random numbers?
(
crypto.stackexchange.com
)
4 points
by
Alupis
on April 25, 2023
|
past
|
1 comment
Is there a feasible preimage attack for any hash function today?
(
crypto.stackexchange.com
)
2 points
by
tgamblin
on April 5, 2023
|
past
|
2 comments
Why does my SSH private key still work after changing some bytes? (2016)
(
crypto.stackexchange.com
)
551 points
by
curling_grad
on Dec 31, 2022
|
past
|
84 comments
Is AES-128 quantum safe?
(
crypto.stackexchange.com
)
4 points
by
samuel246
on Dec 8, 2022
|
past
Why does GMP only run Miller-Rabin test twice when generating a prime?
(
crypto.stackexchange.com
)
1 point
by
irjustin
on Dec 3, 2022
|
past
MD5: Existence of Invariant (Fixed Point)
(
crypto.stackexchange.com
)
2 points
by
susam
on Nov 13, 2022
|
past
Why use non-extractable keys?
(
crypto.stackexchange.com
)
2 points
by
EGreg
on Nov 11, 2022
|
past
Why do web APIs tend to use pre-shared keys for client auth instead of pubkeys?
(
crypto.stackexchange.com
)
2 points
by
zhxshen
on Sept 13, 2022
|
past
|
1 comment
Why do web-services tend to use preshared secret keys for client authentication
(
crypto.stackexchange.com
)
1 point
by
todsacerdoti
on Sept 12, 2022
|
past
How easy is it in 2022 to find a SHA1 collision?
(
crypto.stackexchange.com
)
339 points
by
gary_0
on April 24, 2022
|
past
|
165 comments
Tuples secure multi-party computation against malicious adversaries algorithms
(
crypto.stackexchange.com
)
2 points
by
wslh
on March 19, 2022
|
past
Apple's New CSAM Protections May Make iCloud Photos Bruteforceable
(
crypto.stackexchange.com
)
233 points
by
NTroy
on Aug 8, 2021
|
past
|
81 comments
Is using the same IV the same as not using an IV at all?
(
crypto.stackexchange.com
)
6 points
by
likecarter
on June 9, 2021
|
past
|
1 comment
Are hash functions strong against quantum cryptanalysis?
(
crypto.stackexchange.com
)
2 points
by
doener
on March 8, 2021
|
past
Crypto.se is debunking Terra Quantum AG claim to have broken AES as a scam
(
crypto.stackexchange.com
)
1 point
by
anomalroil
on Feb 10, 2021
|
past
Why is HMAC-SHA1 still considered secure? (2015)
(
crypto.stackexchange.com
)
2 points
by
chanind
on Dec 31, 2020
|
past
ASK HN: Are there cryptographical flaws in this e2ee website chat widget?
(
crypto.stackexchange.com
)
1 point
by
AdriaanvRossum
on April 19, 2020
|
past
|
1 comment
Is 128-bit security still considered strong in 2020
(
crypto.stackexchange.com
)
1 point
by
azhenley
on Jan 24, 2020
|
past
Is 128-bit security still considered strong in 2020?
(
crypto.stackexchange.com
)
2 points
by
anomalroil
on Jan 14, 2020
|
past
Public key – Who verifies the trust of certificate authorities?
(
crypto.stackexchange.com
)
4 points
by
vinnyglennon
on Dec 27, 2019
|
past
Can you create a time capsule using cryptography?
(
crypto.stackexchange.com
)
1 point
by
bikeshaving
on July 8, 2019
|
past
|
1 comment
Is Convergent Encryption Secure?
(
crypto.stackexchange.com
)
2 points
by
anaphor
on June 14, 2019
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.