Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Time-Locked Encryption (iacr.org)
4 points by tatatatle on June 15, 2021 | past
Time-locked Encryption Made Practical [pdf] (iacr.org)
3 points by tatle on June 14, 2021 | past
How to Mimic Bitcoin via Proof-of-Stake [pdf] (iacr.org)
2 points by wslh on May 27, 2021 | past
Mobile private contact discovery at scale (iacr.org)
1 point by ignoramous on May 26, 2021 | past
Security and Trust in Open Source Security Tokens (iacr.org)
1 point by nfrankel on May 21, 2021 | past
Critical perspectives on provable security (2019) [pdf] (iacr.org)
1 point by Tomte on April 21, 2021 | past
Stealthy Dopant-Level Hardware Trojans (2013) [pdf] (iacr.org)
38 points by weinzierl on April 19, 2021 | past | 3 comments
Stealthy Dopant-Level Hardware Trojans [pdf] (iacr.org)
1 point by weinzierl on April 18, 2021 | past
How to Backdoor a Cipher (iacr.org)
7 points by EthanHeilman on April 7, 2021 | past | 1 comment
Iacr.org Website Taken over by Satoshi (iacr.org)
3 points by istillwritecode on April 1, 2021 | past | 1 comment
Attacking (EC)DSA with Partially Known Multiples of Nonces (iacr.org)
2 points by nanis on March 18, 2021 | past
What is the funniest number in cryptography? 0 (iacr.org)
3 points by nanis on March 12, 2021 | past
Breaking the “Lattice Barrier” for the Hidden Number Problem (iacr.org)
35 points by nanis on March 5, 2021 | past | 3 comments
Alt-Coin Traceability [pdf] (iacr.org)
8 points by lawrenceyan on March 4, 2021 | past
Fast Factoring Integers by SVP Algorithms: “This Destroys the RSA Cryptosystem.” [pdf] (iacr.org)
14 points by sb057 on March 4, 2021 | past | 4 comments
Factoring Integers by CVP and SVP Algorithms [pdf] (iacr.org)
4 points by LopRabbit on March 3, 2021 | past
“This destroys the RSA cryptosystem” (iacr.org)
279 points by renaudg on March 2, 2021 | past | 146 comments
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy (2020) [pdf] (iacr.org)
1 point by dgellow on Feb 4, 2021 | past
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol [pdf] (2019) (iacr.org)
90 points by dgellow on Jan 31, 2021 | past | 70 comments
Streaming Merkle Proofs in Binary Numeral Trees (iacr.org)
6 points by nemo1618 on Jan 12, 2021 | past
Cryptographic Competitions (iacr.org)
3 points by MrXOR on Dec 29, 2020 | past | 1 comment
Partitioning Oracle Attacks (iacr.org)
6 points by tptacek on Dec 26, 2020 | past | 1 comment
On the Security of Homomorphic Encryption on Approximate Numbers [pdf] (iacr.org)
2 points by JMill on Dec 9, 2020 | past
Single-Message Credential-Hiding Login [pdf] (iacr.org)
3 points by earthboundkid on Dec 6, 2020 | past
How to abuse and fix authenticated encryption without key commitment (iacr.org)
2 points by fanf2 on Nov 20, 2020 | past
How to Abuse and Fix Authenticated Encryption Without Key Commitment (iacr.org)
1 point by g0xA52A2A on Nov 19, 2020 | past
Indistinguishability Obfuscation from Well-Founded Assumptions [pdf] (iacr.org)
1 point by nobody9999 on Nov 11, 2020 | past | 1 comment
Asynchronous Remote Key Generation: An Analysis of Yubicos Proposal for WebAuthn [pdf] (iacr.org)
2 points by vanburen on Nov 2, 2020 | past
A Discretization Attack [pdf] (iacr.org)
2 points by JoachimS on Nov 2, 2020 | past
Vault1317/signal-dakez: pubkey concealing and deniablity based on OTRv3/Signal (iacr.org)
2 points by hardenedvault on Oct 16, 2020 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: