Hacker News new | past | comments | ask | show | jobs | submit | from login
Passkeys – Under the Hood (kudelskisecurity.com)
158 points by paulgerhardt 5 months ago | past | 103 comments
Fuzzomatic: Using AI to Automatically Fuzz Rust Projects from Scratch (kudelskisecurity.com)
3 points by spiridow 9 months ago | past
Lattice-free half-half attack on Bitcoin and Ethereum (kudelskisecurity.com)
2 points by ipolit on July 11, 2023 | past | 1 comment
CVE-2023-23397 – Microsoft Outlook Privilege Elevation Critical Vulnerability (kudelskisecurity.com)
2 points by thg on March 16, 2023 | past
Polynonce: A Tale of a Novel Ecdsa Attack and Bitcoin Tears (kudelskisecurity.com)
32 points by lisper on March 6, 2023 | past | 4 comments
Polynonce: A Tale of a Novel ECDSA Attack and Bitcoin Tears (kudelskisecurity.com)
3 points by spiridow on March 6, 2023 | past
Releasing a Timelocked Responsible Disclosure (kudelskisecurity.com)
1 point by ipolit on Feb 23, 2023 | past | 1 comment
An Introduction to Oblivious RAM (2020) (kudelskisecurity.com)
1 point by kerneloops on Feb 17, 2023 | past | 1 comment
A Timelocked Responsible Disclosure (kudelskisecurity.com)
1 point by ipolit on Jan 16, 2023 | past | 1 comment
Shufflecake: plausible deniability for multiple hidden filesystems (kudelskisecurity.com)
3 points by Ptchd on Nov 12, 2022 | past
Shufflecake: Plausible Deniability for Multiple Hidden Filesystems (kudelskisecurity.com)
3 points by tomgag on Nov 10, 2022 | past | 3 comments
The definitive guide to “modulo bias” and how to avoid it (2020) (kudelskisecurity.com)
133 points by isomorph on Sept 15, 2022 | past | 44 comments
Practical bruteforce of AES-1024 military grade encryption (kudelskisecurity.com)
44 points by homarp on May 12, 2022 | past | 12 comments
Open-source crypto is no better than closed-source crypto (2018) (kudelskisecurity.com)
1 point by Tomte on April 9, 2022 | past | 1 comment
Practical attacks against attribute-based encryption (kudelskisecurity.com)
3 points by spiridow on Nov 12, 2021 | past
Automatically Fix Security Issues at the Source (kudelskisecurity.com)
2 points by spiridow on Nov 9, 2021 | past
How to Defeat Ed25519 and EdDSA Using Faults [2017] (kudelskisecurity.com)
2 points by lisper on Sept 24, 2021 | past | 2 comments
Open-source crypto is no better than closed-source crypto (2018) (kudelskisecurity.com)
2 points by Tomte on Aug 3, 2021 | past
Oramfs: Resizable ORAM, Remote Storage Agnostic, Written in Rust (kudelskisecurity.com)
3 points by spiridow on June 30, 2021 | past
Advancing Rust Support in Semgrep (kudelskisecurity.com)
8 points by spiridow on April 14, 2021 | past
Open-source crypto is no better than closed-source crypto (2018) (kudelskisecurity.com)
1 point by Tomte on Dec 1, 2020 | past
How to not reissue 100,000s of EE certs after the Dangerous Delegated OCSP issue (kudelskisecurity.com)
3 points by anomalroil on Nov 17, 2020 | past
A Solution to the Dangerous Delegated Responder Certificate Problem (kudelskisecurity.com)
1 point by zimmerfrei on Nov 16, 2020 | past
The definitive guide to “Modulo Bias and how to avoid it” (kudelskisecurity.com)
2 points by anomalroil on July 30, 2020 | past
Fooling Neural Networks with Noise (kudelskisecurity.com)
1 point by atomlib on July 27, 2020 | past
When Constant-Time Source Code May Not Save You (2017) (kudelskisecurity.com)
2 points by beefhash on Feb 21, 2020 | past
FIDO2 Deep Dive: Attestations, Trust Model and Security (kudelskisecurity.com)
2 points by aburan28 on Feb 12, 2020 | past
CVE-2020-0601: the ChainOfFools attack explained with PoC (kudelskisecurity.com)
3 points by anomalroil on Jan 16, 2020 | past
Forget Homomorphic Encryption, Here Comes Functional Encryption (kudelskisecurity.com)
3 points by EvgeniyZh on Dec 3, 2019 | past
Forget Homomorphic Encryption, Here Comes Functional Encryption (kudelskisecurity.com)
3 points by wyldfire on Dec 2, 2019 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: