Hacker News new | past | comments | ask | show | jobs | submit | from login
The sins of the 90s: Questioning a puzzling claim about mass surveillance (cr.yp.to)
243 points by ibotty 6 days ago | past | 193 comments
D. J. Bernstein (cr.yp.to)
2 points by gone35 12 days ago | past | discuss
Don't Publish with IEEE (2005) (cr.yp.to)
239 points by stargrave 12 days ago | past | 92 comments
A plea for lean software [pdf] (cr.yp.to)
4 points by udev4096 23 days ago | past | 1 comment
Libntruprime is a microlibrary for the Streamlined NTRU Prime cryptosyst (cr.yp.to)
21 points by zdw 69 days ago | past
Clang vs. Clang (cr.yp.to)
248 points by dchest 3 months ago | past | 399 comments
Plagiarism as a Patent Amplifier (cr.yp.to)
2 points by Tomte 3 months ago | past
Abbreviating the stream-cipher discussions (2005) (cr.yp.to)
1 point by rdpintqogeogsaa 3 months ago | past
Salsa20 ciphers in assembly for different architectures (cr.yp.to)
2 points by jmspring 3 months ago | past | 1 comment
Invulnerable Software (2008) [pdf] (cr.yp.to)
1 point by todsacerdoti 4 months ago | past
Bibliography keys: It's as easy as [1], [2], [3] (cr.yp.to)
64 points by stargrave 4 months ago | past | 27 comments
CryptAttackTester: high-assurance attack analysis (cr.yp.to)
1 point by skilled 4 months ago | past | 1 comment
UTC, Tai, and Unix Time (2001) (cr.yp.to)
142 points by enz 5 months ago | past | 141 comments
How does DNS work? (2002) (cr.yp.to)
16 points by 1vuio0pswjnm7 7 months ago | past | 13 comments
Keep Secrets from Chrome [pdf] (cr.yp.to)
1 point by weinzierl 7 months ago | past
Keep Secrets from Chrome [pdf] (cr.yp.to)
1 point by weinzierl 7 months ago | past
NSA, NIST, and post-quantum cryptography (cr.yp.to)
2 points by mfrw 7 months ago | past | 1 comment
A modest proposal for reducing mail traffic (1996) (cr.yp.to)
13 points by Shugyousha 8 months ago | past | 5 comments
Niklaus Wirth – Plea for Lean Software (1995) [pdf] (cr.yp.to)
4 points by dist-epoch 8 months ago | past
Two File Descriptors for Sockets (cr.yp.to)
109 points by goranmoomin 9 months ago | past | 65 comments
Kyberslash: Division timings depending on secrets in Kyber software (cr.yp.to)
1 point by jgeralnik 10 months ago | past
A Plea For Lean Software (1995) [pdf] (cr.yp.to)
3 points by kaycebasques 10 months ago | past
Double encryption: Analyzing the NSA/GCHQ arguments against hybrids (cr.yp.to)
171 points by weinzierl 10 months ago | past | 56 comments
Predicting performance for post-quantum encrypted-file systems [pdf] (cr.yp.to)
1 point by nabla9 11 months ago | past
Another way to botch the security analysis of Kyber-512 (cr.yp.to)
16 points by todsacerdoti 11 months ago | past | 2 comments
Reducing "gate" counts for Kyber-512 contradicting NIST's calculation (cr.yp.to)
30 points by nabla9 on Oct 23, 2023 | past | 7 comments
Identifying the boundaries of acceptability for cryptographic standards: BADA55 (cr.yp.to)
2 points by opengears on Oct 8, 2023 | past | 1 comment
Debunking NIST's calculation of the Kyber-512 security level (cr.yp.to)
468 points by bumbledraven on Oct 3, 2023 | past | 201 comments
Boring Crypto (2015) [pdf] (cr.yp.to)
70 points by fdeage on Sept 16, 2023 | past | 25 comments
Papers with computer-checked proofs [pdf] (cr.yp.to)
3 points by staunton on Sept 11, 2023 | past | 1 comment

Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: