| | Time-Locked Encryption (iacr.org) |
| 4 points by tatatatle on June 15, 2021 | past |
|
| | Time-locked Encryption Made Practical [pdf] (iacr.org) |
| 3 points by tatle on June 14, 2021 | past |
|
| | How to Mimic Bitcoin via Proof-of-Stake [pdf] (iacr.org) |
| 2 points by wslh on May 27, 2021 | past |
|
| | Mobile private contact discovery at scale (iacr.org) |
| 1 point by ignoramous on May 26, 2021 | past |
|
| | Security and Trust in Open Source Security Tokens (iacr.org) |
| 1 point by nfrankel on May 21, 2021 | past |
|
| | Critical perspectives on provable security (2019) [pdf] (iacr.org) |
| 1 point by Tomte on April 21, 2021 | past |
|
| | Stealthy Dopant-Level Hardware Trojans (2013) [pdf] (iacr.org) |
| 38 points by weinzierl on April 19, 2021 | past | 3 comments |
|
| | Stealthy Dopant-Level Hardware Trojans [pdf] (iacr.org) |
| 1 point by weinzierl on April 18, 2021 | past |
|
| | How to Backdoor a Cipher (iacr.org) |
| 7 points by EthanHeilman on April 7, 2021 | past | 1 comment |
|
| | Iacr.org Website Taken over by Satoshi (iacr.org) |
| 3 points by istillwritecode on April 1, 2021 | past | 1 comment |
|
| | Attacking (EC)DSA with Partially Known Multiples of Nonces (iacr.org) |
| 2 points by nanis on March 18, 2021 | past |
|
| | What is the funniest number in cryptography? 0 (iacr.org) |
| 3 points by nanis on March 12, 2021 | past |
|
| | Breaking the “Lattice Barrier” for the Hidden Number Problem (iacr.org) |
| 35 points by nanis on March 5, 2021 | past | 3 comments |
|
| | Alt-Coin Traceability [pdf] (iacr.org) |
| 8 points by lawrenceyan on March 4, 2021 | past |
|
| | Fast Factoring Integers by SVP Algorithms: “This Destroys the RSA Cryptosystem.” [pdf] (iacr.org) |
| 14 points by sb057 on March 4, 2021 | past | 4 comments |
|
| | Factoring Integers by CVP and SVP Algorithms [pdf] (iacr.org) |
| 4 points by LopRabbit on March 3, 2021 | past |
|
| | “This destroys the RSA cryptosystem” (iacr.org) |
| 279 points by renaudg on March 2, 2021 | past | 146 comments |
|
| | Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy (2020) [pdf] (iacr.org) |
| 1 point by dgellow on Feb 4, 2021 | past |
|
| | Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol [pdf] (2019) (iacr.org) |
| 90 points by dgellow on Jan 31, 2021 | past | 70 comments |
|
| | Streaming Merkle Proofs in Binary Numeral Trees (iacr.org) |
| 6 points by nemo1618 on Jan 12, 2021 | past |
|
| | Cryptographic Competitions (iacr.org) |
| 3 points by MrXOR on Dec 29, 2020 | past | 1 comment |
|
| | Partitioning Oracle Attacks (iacr.org) |
| 6 points by tptacek on Dec 26, 2020 | past | 1 comment |
|
| | On the Security of Homomorphic Encryption on Approximate Numbers [pdf] (iacr.org) |
| 2 points by JMill on Dec 9, 2020 | past |
|
| | Single-Message Credential-Hiding Login [pdf] (iacr.org) |
| 3 points by earthboundkid on Dec 6, 2020 | past |
|
| | How to abuse and fix authenticated encryption without key commitment (iacr.org) |
| 2 points by fanf2 on Nov 20, 2020 | past |
|
| | How to Abuse and Fix Authenticated Encryption Without Key Commitment (iacr.org) |
| 1 point by g0xA52A2A on Nov 19, 2020 | past |
|
| | Indistinguishability Obfuscation from Well-Founded Assumptions [pdf] (iacr.org) |
| 1 point by nobody9999 on Nov 11, 2020 | past | 1 comment |
|
| | Asynchronous Remote Key Generation: An Analysis of Yubicos Proposal for WebAuthn [pdf] (iacr.org) |
| 2 points by vanburen on Nov 2, 2020 | past |
|
| | A Discretization Attack [pdf] (iacr.org) |
| 2 points by JoachimS on Nov 2, 2020 | past |
|
| | Vault1317/signal-dakez: pubkey concealing and deniablity based on OTRv3/Signal (iacr.org) |
| 2 points by hardenedvault on Oct 16, 2020 | past |
|
|
| More |