Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
NSA and IETF, part 3: Dodging the issues at hand (cr.yp.to)
316 points by upofadown 11 days ago | past | 229 comments
NSA and IETF, Part 2 (cr.yp.to)
16 points by zdw 11 days ago | past | 4 comments
cdb.cr.yp.to (new version of cdb) (cr.yp.to)
2 points by 1vuio0pswjnm7 32 days ago | past
Notes by djb on using Fil-C (cr.yp.to)
365 points by transpute 33 days ago | past | 246 comments
Notes by djb on using Fil-C with Debian multiarch (cr.yp.to)
10 points by fanf2 35 days ago | past
MODPOD: The collapse of IETF's protections for dissent (cr.yp.to)
8 points by gjvc 42 days ago | past
Cdb: Add support for cdb64 (cr.yp.to)
86 points by kreco 44 days ago | past | 26 comments
64-bit release of CDB by DJB (cr.yp.to)
2 points by howerj 44 days ago | past
Fast, constant-time, correct: pick three – Daniel J. Bernstein [pdf] (cr.yp.to)
8 points by nabla9 58 days ago | past
The collapse of IETF's protections for dissent (cr.yp.to)
5 points by Y_Y 60 days ago | past
MODPOD: The collapse of IETF's protections for dissent (cr.yp.to)
10 points by zdw 60 days ago | past | 1 comment
NSA and IETF: Can an attacker purchase standardization of weakened cryptography? (cr.yp.to)
251 points by zdw 61 days ago | past | 109 comments
Surreptitious Surveillance (cr.yp.to)
2 points by tatersolid 65 days ago | past
Surreptitious Surveillance (cr.yp.to)
5 points by nabla9 65 days ago | past
Some thoughts on security after ten years of qmail 1.0 (2007) [pdf] (cr.yp.to)
2 points by JNRowe 88 days ago | past
Complaint regarding a declaration of consensus to adopt a non-hybrid draft [pdf] (cr.yp.to)
2 points by Perseids 3 months ago | past
Debunking NIST's calculation of the Kyber-512 security level (2023) (cr.yp.to)
59 points by RA2lover 5 months ago | past | 21 comments
McEliece standardization: Looking at what's happening, and analyzing rationales (cr.yp.to)
5 points by 1vuio0pswjnm7 6 months ago | past
The cryptoint library (DJB) [pdf] (cr.yp.to)
4 points by frutiger 7 months ago | past
McEliece Standardisation (cr.yp.to)
2 points by quadhome 7 months ago | past
The Cryptoint Library [pdf] (cr.yp.to)
4 points by todsacerdoti 7 months ago | past
McEliece standardization: Looking at what's happening, and analyzing (cr.yp.to)
3 points by nabla9 7 months ago | past | 1 comment
The McEliece cryptosystem – Daniel J. Bernstein (talk slides) [pdf] (cr.yp.to)
2 points by nabla9 8 months ago | past | 2 comments
Entropy Attacks (cr.yp.to)
102 points by todsacerdoti 8 months ago | past | 32 comments
PQConnect: "TLS is a very large programming project." [pdf] (cr.yp.to)
3 points by 1vuio0pswjnm7 10 months ago | past
Looking at some claims that quantum computers won't work (cr.yp.to)
68 points by gjvc 10 months ago | past | 53 comments
Automated proof of the transcendence of π in HOL light (cr.yp.to)
3 points by keepamovin 11 months ago | past
The sins of the 90s: Questioning a puzzling claim about mass surveillance (cr.yp.to)
243 points by ibotty on Oct 28, 2024 | past | 193 comments
D. J. Bernstein (cr.yp.to)
2 points by gone35 on Oct 22, 2024 | past
Don't Publish with IEEE (2005) (cr.yp.to)
239 points by stargrave on Oct 22, 2024 | past | 92 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: