For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
Timing attack in Google Keyczar library (2009)
(
root.org
)
1 point
by
abricq
7 months ago
|
past
Dead-listing while on vacation (2008)
(
root.org
)
1 point
by
cpach
on Aug 23, 2022
|
past
Stuxnet is embarrassing, not amazing (2011)
(
root.org
)
117 points
by
rdpintqogeogsaa
on June 12, 2022
|
past
|
91 comments
Internet Protocol Design
(
root.org
)
1 point
by
autoditype
on Jan 17, 2021
|
past
Software protection: Protecting the protection code
(
root.org
)
1 point
by
beefhash
on June 28, 2020
|
past
Stuxnet was embarrassing, not amazing (2011)
(
root.org
)
121 points
by
MrXOR
on Nov 3, 2019
|
past
|
82 comments
Recovering a private key with only a fraction of the bits – rdist
(
root.org
)
1 point
by
aburan28
on Dec 7, 2017
|
past
Final Post on JavaScript Crypto
(
root.org
)
2 points
by
rfreytag
on March 10, 2015
|
past
Timing-safe memcmp and API parity
(
root.org
)
6 points
by
wglb
on June 25, 2014
|
past
In Defense of JavaScript Crypto
(
root.org
)
5 points
by
sweis
on June 23, 2014
|
past
Final post on JavaScript crypto
(
root.org
)
1 point
by
wglb
on June 17, 2014
|
past
Digging into the NSA revelations
(
root.org
)
3 points
by
steveklabnik
on Jan 12, 2014
|
past
RSA public keys are not private (implementation)
(
root.org
)
1 point
by
ColinWright
on April 25, 2013
|
past
Has HTML5 made us more secure?
(
root.org
)
2 points
by
B-Con
on Dec 4, 2012
|
past
Cyber Weapon Authors Catch Up On Blog Reading
(
root.org
)
4 points
by
tptacek
on Aug 14, 2012
|
past
RSA repeats earlier claims, but louder
(
root.org
)
2 points
by
wglb
on June 29, 2012
|
past
Why RSA is misleading about SecurID vulnerability
(
root.org
)
3 points
by
wglb
on June 28, 2012
|
past
Why stream ciphers shouldn’t be used for hashing
(
root.org
)
1 point
by
wglb
on Jan 31, 2012
|
past
More on the evolution of password security
(
root.org
)
2 points
by
wglb
on Jan 19, 2012
|
past
On the evolving security of password schemes
(
root.org
)
2 points
by
KateLawson
on Jan 10, 2012
|
past
|
1 comment
Mixed voltage interfacing for design or hacking
(
root.org
)
1 point
by
wglb
on Jan 6, 2012
|
past
Internet Protocol Design and Implementation
(
root.org
)
1 point
by
powertower
on Dec 30, 2011
|
past
The lost Van Jacobson paper that could save the Internet
(
root.org
)
280 points
by
wglb
on Dec 30, 2011
|
past
|
48 comments
Stop using unsafe keyed hashes, use HMAC
(
root.org
)
1 point
by
fosk
on Dec 12, 2011
|
past
Recovering a private key with only a fraction of the bits
(
root.org
)
4 points
by
wglb
on Sept 23, 2011
|
past
The HDCP magic inside Bunnie's NeTV
(
root.org
)
15 points
by
fanf2
on Sept 14, 2011
|
past
|
1 comment
Old programming habits die hard
(
root.org
)
3 points
by
l0stman
on Sept 3, 2011
|
past
Quantum cryptography is useless
(
root.org
)
2 points
by
karlzt
on Aug 16, 2011
|
past
Intermediate cryptography resources
(
root.org
)
8 points
by
there
on June 28, 2011
|
past
State space explosion in program analysis and crypto
(
root.org
)
3 points
by
taylorbuley
on May 17, 2011
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.