Hacker News new | comments | show | ask | jobs | submit | from login
Output Compression, MPC, and IO for Turing Machines [pdf] (iacr.org)
1 point by lainon 2 days ago | past | web | discuss
Strong Authentication for RFID Systems Using the AES Algorithm [pdf] (2004) (iacr.org)
2 points by jbfoo 9 days ago | past | web | discuss
Leakage-Resilient Client-Side Deduplication of Encrypted Data in Cloud Storage [pdf] (iacr.org)
29 points by tosh 9 days ago | past | web | 1 comment
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure [pdf] (iacr.org)
2 points by ecesena 13 days ago | past | web | discuss
EPIC: Efficient Private Image Classification (2017) (iacr.org)
6 points by lainon 13 days ago | past | web | discuss
BITE: Bitcoin Lightweight Client Privacy Using Trusted Execution (iacr.org)
1 point by lainon 18 days ago | past | web
Recovering Secrets from Prefix-Dependent Leakage (iacr.org)
1 point by lainon 23 days ago | past | web
A Mathematical Theory of Cryptography (1945) (iacr.org)
3 points by lainon 23 days ago | past | web
Bitcoin Mining: A Game Theoretic Analysis [pdf] (iacr.org)
2 points by lainon 23 days ago | past | web
PPP-Completeness with Connections to Cryptography [pdf] (iacr.org)
2 points by lainon 23 days ago | past | web
Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ (iacr.org)
12 points by lainon 29 days ago | past | web
Xoodoo cookbook [pdf] (iacr.org)
23 points by lainon 29 days ago | past | web | 1 comment
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure (iacr.org)
1 point by based2 34 days ago | past | web | 1 comment
Prime and Prejudice: Primality Testing Under Adversarial Conditions [pdf] (iacr.org)
2 points by wglb 35 days ago | past | web
Pseudo constant time implementations ofTLS are only pseudo secure (iacr.org)
5 points by fanf2 36 days ago | past | web
Primality Testing Under Adversarial Conditions (iacr.org)
51 points by luu 37 days ago | past | web | 8 comments
Random Number Generators Can Be Fooled to Behave Badly (iacr.org)
1 point by lainon 40 days ago | past | web
Post-Quantum Cryptography: Efficient algorithms for supersingular isogeny DH [pdf] (iacr.org)
1 point by ColinWright 40 days ago | past | web
LaTeX TikZ for Cryptographers (iacr.org)
105 points by lordqwerty 41 days ago | past | web | 22 comments
Zipf’s Law in Passwords [pdf] (iacr.org)
8 points by doener 46 days ago | past | web
DECENT – DEcryption Contract ENforcement Tool [pdf] (2016) (iacr.org)
8 points by sprucely 47 days ago | past | web
Rethinking Secure FPGAs: Towards a Cryptography-Friendly Configurable Cell Arch [pdf] (iacr.org)
2 points by godelmachine 48 days ago | past | web
Recent Results in Scalable Multi-Party Computation [pdf] (iacr.org)
1 point by godelmachine 49 days ago | past | web
Transparency logs via append-only authenticated dictionaries (iacr.org)
5 points by fanf2 51 days ago | past | web
uMine: A Blockchain Based on Human Miners (iacr.org)
2 points by lainon 52 days ago | past | web
Zipf’s Law in Passwords (2014) [pdf] (iacr.org)
1 point by doener 53 days ago | past | web
Practical accountability of secret processes [pdf] (iacr.org)
1 point by dosy 56 days ago | past | web
Parameter-Hiding Order Revealing Encryption (iacr.org)
2 points by lainon 60 days ago | past | web
SPHINX: A Password Store That Perfectly Hides Passwords from Itself (iacr.org)
2 points by coolspot 61 days ago | past | web
Practical Accountability of Secret Processes (iacr.org)
29 points by lainon 61 days ago | past | web | 3 comments
More

Applications are open for YC Winter 2019

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: