Hacker News new | comments | show | ask | jobs | submit | from login
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols (iacr.org)
2 points by MrXOR 1 day ago | past | web | discuss
The 9 Lives of Bleichenbacher’s CAT: New Cache Attacks on TLS Implementations [pdf] (iacr.org)
44 points by shshhdhs 12 days ago | past | web | 4 comments
Real World Crypto conference program, scheduled for Jan 9-11, 2019 (iacr.org)
2 points by petethomas 16 days ago | past | web | 1 comment
An Analysis of the ProtonMail Cryptographic Architecture (iacr.org)
5 points by Jerry2 22 days ago | past | web
Analysis of ProtonMail Cryptographic Architecture (iacr.org)
2 points by ninegunpi 25 days ago | past | web | 1 comment
An Analysis of the ProtonMail Cryptographic Architecture [pdf] (iacr.org)
61 points by phoe-krk 25 days ago | past | web | 26 comments
An Analysis of the ProtonMail Cryptographic Architecture (iacr.org)
3 points by xwvvvvwx 26 days ago | past | web
An Analysis of the ProtonMail Cryptographic Architecture [pdf] (iacr.org)
7 points by zahllos 26 days ago | past | web | 9 comments
Plaintext Recovery Attack of OCB2 [pdf] (iacr.org)
3 points by tptacek 33 days ago | past | web | 1 comment
Untagging Tor: A Formal Treatment of Onion Encryption [pdf] (iacr.org)
5 points by lainon 39 days ago | past | web
Prime and Prejudice: Primality Testing Under Adversarial Conditions [pdf] (iacr.org)
2 points by pedro84 43 days ago | past | web
Cryptography During the French and American Wars in Vietnam [pdf] (iacr.org)
5 points by petethomas 43 days ago | past | web
The OCB2 authenticated encryption scheme (ISO standard) has been broken (iacr.org)
44 points by erwan 45 days ago | past | web | 29 comments
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble [pdf] (iacr.org)
6 points by lainon 46 days ago | past | web
Prime and Prejudice: Primality Testing in Adversarial Conditions (CVE-2018-4398) [pdf] (iacr.org)
3 points by erwan 46 days ago | past | web
Hopes, fears, and software obfuscation [pdf] (iacr.org)
2 points by MrXOR 51 days ago | past | web
A Defense Against Cache Timing Attacks in Speculative Execution Processors [pdf] (iacr.org)
4 points by MrXOR 52 days ago | past | web
Prime and Prejudice: Primality Testing Under Adversarial Conditions [pdf] (iacr.org)
1 point by jgrahamc 59 days ago | past | web
Distributed Single Password Protocol Framework (iacr.org)
1 point by ccnafr 61 days ago | past | web
Enabling Decentralized Private Computation (iacr.org)
119 points by petethomas 62 days ago | past | web | 4 comments
Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level [pdf] (iacr.org)
3 points by lainon 71 days ago | past | web
Output Compression, MPC, and IO for Turing Machines [pdf] (iacr.org)
1 point by lainon 84 days ago | past | web
Strong Authentication for RFID Systems Using the AES Algorithm [pdf] (2004) (iacr.org)
2 points by jbfoo 3 months ago | past | web
Leakage-Resilient Client-Side Deduplication of Encrypted Data in Cloud Storage [pdf] (iacr.org)
29 points by tosh 3 months ago | past | web | 1 comment
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure [pdf] (iacr.org)
2 points by ecesena 3 months ago | past | web
EPIC: Efficient Private Image Classification (2017) (iacr.org)
6 points by lainon 3 months ago | past | web
BITE: Bitcoin Lightweight Client Privacy Using Trusted Execution (iacr.org)
1 point by lainon 3 months ago | past | web
Recovering Secrets from Prefix-Dependent Leakage (iacr.org)
1 point by lainon 3 months ago | past | web
A Mathematical Theory of Cryptography (1945) (iacr.org)
3 points by lainon 3 months ago | past | web
Bitcoin Mining: A Game Theoretic Analysis [pdf] (iacr.org)
2 points by lainon 3 months ago | past | web
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: