Arthur Besse@lemmy.mlMEnglish · 1 month agoIACR Held an Election. They Can’t Decrypt the Results.plus-squarewww.nytimes.comexternal-linkmessage-square1linkfedilinkarrow-up114
arrow-up114external-linkIACR Held an Election. They Can’t Decrypt the Results.plus-squarewww.nytimes.comArthur Besse@lemmy.mlMEnglish · 1 month agomessage-square1linkfedilink
Arthur Besse@lemmy.mlMEnglish · 3 months agoNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?blog.cr.yp.toexternal-linkmessage-square0linkfedilinkarrow-up15
arrow-up15external-linkNSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?blog.cr.yp.toArthur Besse@lemmy.mlMEnglish · 3 months agomessage-square0linkfedilink
Arthur Besse@lemmy.mlMEnglish · 4 months agoChaCha12-BLAKE3: Secure, Simple and Fast authenticated and committing encryption for any CPUplus-squarekerkour.comexternal-linkmessage-square3linkfedilinkarrow-up17
arrow-up17external-linkChaCha12-BLAKE3: Secure, Simple and Fast authenticated and committing encryption for any CPUplus-squarekerkour.comArthur Besse@lemmy.mlMEnglish · 4 months agomessage-square3linkfedilink
Arthur Besse@lemmy.mlMEnglish · 5 months agoReplication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dogeprint.iacr.orgexternal-linkmessage-square0linkfedilinkarrow-up15
arrow-up15external-linkReplication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dogeprint.iacr.orgArthur Besse@lemmy.mlMEnglish · 5 months agomessage-square0linkfedilink
hanno@lemmy.worldEnglish · 10 months agoMixing up Public and Private Keys in OpenID Connect deploymentsplus-squareblog.hboeck.deexternal-linkmessage-square0linkfedilinkarrow-up17
arrow-up17external-linkMixing up Public and Private Keys in OpenID Connect deploymentsplus-squareblog.hboeck.dehanno@lemmy.worldEnglish · 10 months agomessage-square0linkfedilink
Arthur Besse@lemmy.mlMEnglish · 11 months agoAs expensive as a plane flight: Looking at some claims that quantum computers won't work.blog.cr.yp.toexternal-linkmessage-square0linkfedilinkarrow-up14
arrow-up14external-linkAs expensive as a plane flight: Looking at some claims that quantum computers won't work.blog.cr.yp.toArthur Besse@lemmy.mlMEnglish · 11 months agomessage-square0linkfedilink
Jaromil@fed.dyne.org · 1 year agoOn the Proof of Ownership of Digital Walletsplus-squarewww.mdpi.comexternal-linkmessage-square1linkfedilinkarrow-up13
arrow-up13external-linkOn the Proof of Ownership of Digital Walletsplus-squarewww.mdpi.comJaromil@fed.dyne.org · 1 year agomessage-square1linkfedilink
A1kmm@lemmy.amxl.comEnglish · 1 year agoProject Uniquonym - a concept (not yet implemented) for coupling pseudonymity with limits on sybil attacks / astroturfingplus-squarelemmy.amxl.comexternal-linkmessage-square0linkfedilinkarrow-up14
arrow-up14external-linkProject Uniquonym - a concept (not yet implemented) for coupling pseudonymity with limits on sybil attacks / astroturfingplus-squarelemmy.amxl.comA1kmm@lemmy.amxl.comEnglish · 1 year agomessage-square0linkfedilink
OCTADE@soc.octade.net · 1 year agoGOLDILOCKER Brain Wallet - Generate OpenSSL Goldilocks Elliptic Curve Keys from Seed Phraseplus-squaremessage-squaremessage-square0linkfedilinkarrow-up14
arrow-up14message-squareGOLDILOCKER Brain Wallet - Generate OpenSSL Goldilocks Elliptic Curve Keys from Seed Phraseplus-squareOCTADE@soc.octade.net · 1 year agomessage-square0linkfedilink
OCTADE@soc.octade.net · edit-21 year agoKSRNG - Key Strike Random Generator (version 0.0.1)plus-squaremessage-squaremessage-square2linkfedilinkarrow-up12
arrow-up12message-squareKSRNG - Key Strike Random Generator (version 0.0.1)plus-squareOCTADE@soc.octade.net · edit-21 year agomessage-square2linkfedilink
OCTADE@soc.octade.net · edit-21 year agoMEGARAND Extreme Overkill Random Seed Generatorplus-squaremessage-squaremessage-square2linkfedilinkarrow-up13
arrow-up13message-squareMEGARAND Extreme Overkill Random Seed Generatorplus-squareOCTADE@soc.octade.net · edit-21 year agomessage-square2linkfedilink
OCTADE@soc.octade.net · edit-21 year agoCryptologue Arcade - Crypto Darkpaper - Crypto Color Prints - Simplementation Scheme : A Color-Coded Method For Indexing Research and Documentationplus-squaremessage-squaremessage-square0linkfedilinkarrow-up13
arrow-up13message-squareCryptologue Arcade - Crypto Darkpaper - Crypto Color Prints - Simplementation Scheme : A Color-Coded Method For Indexing Research and Documentationplus-squareOCTADE@soc.octade.net · edit-21 year agomessage-square0linkfedilink
OCTADE@soc.octade.net · edit-21 year agoHexlish Alphabet for English, Constructed Languages and Cryptography: Automatic, Structural Compression with a Phonetic Hexadecimal Alphabetplus-squaremessage-squaremessage-square0linkfedilinkarrow-up15
arrow-up15message-squareHexlish Alphabet for English, Constructed Languages and Cryptography: Automatic, Structural Compression with a Phonetic Hexadecimal Alphabetplus-squareOCTADE@soc.octade.net · edit-21 year agomessage-square0linkfedilink
Jaromil@fed.dyne.org · 1 year agoLatticeGen: how to hide LLM conversations for Privacy-Aware Cloud AIplus-squarearxiv.orgexternal-linkmessage-square0linkfedilinkarrow-up12
arrow-up12external-linkLatticeGen: how to hide LLM conversations for Privacy-Aware Cloud AIplus-squarearxiv.orgJaromil@fed.dyne.org · 1 year agomessage-square0linkfedilink
Arthur Besse@lemmy.mlMEnglish · 1 year ago"The sins of the 90s": Questioning a puzzling claim by Meredith Whittaker about mass surveillanceblog.cr.yp.toexternal-linkmessage-square1linkfedilinkarrow-up16
arrow-up16external-link"The sins of the 90s": Questioning a puzzling claim by Meredith Whittaker about mass surveillanceblog.cr.yp.toArthur Besse@lemmy.mlMEnglish · 1 year agomessage-square1linkfedilink
Arthur Besse@lemmy.mlMEnglish · 1 year agoNIST Announces 14 Candidates to Advance to the Second Round of the Additional Digital Signatures for the Post-Quantum Cryptography Standardization Processplus-squarecsrc.nist.govexternal-linkmessage-square0linkfedilinkarrow-up110
arrow-up110external-linkNIST Announces 14 Candidates to Advance to the Second Round of the Additional Digital Signatures for the Post-Quantum Cryptography Standardization Processplus-squarecsrc.nist.govArthur Besse@lemmy.mlMEnglish · 1 year agomessage-square0linkfedilink
Arthur Besse@lemmy.mlMEnglish · 1 year agoNSA's influence on cryptographic standards (slides from a 2022 talk by D. J. Bernstein)plus-squarecr.yp.toexternal-linkmessage-square3linkfedilinkarrow-up15
arrow-up15external-linkNSA's influence on cryptographic standards (slides from a 2022 talk by D. J. Bernstein)plus-squarecr.yp.toArthur Besse@lemmy.mlMEnglish · 1 year agomessage-square3linkfedilink
yo_scottie_oh@lemmy.mlEnglish · 1 year agoPublic Key Cryptography - Computerphileplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up14
arrow-up14external-linkPublic Key Cryptography - Computerphileplus-squareyoutu.beyo_scottie_oh@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
positive_intentions@lemmy.mlEnglish · 1 year agoEncrypted P2P Chatplus-squarechat.positive-intentions.comexternal-linkmessage-square17linkfedilinkarrow-up13
arrow-up13external-linkEncrypted P2P Chatplus-squarechat.positive-intentions.compositive_intentions@lemmy.mlEnglish · 1 year agomessage-square17linkfedilink
solrize@lemmy.world · 1 year agoBernstein and Lange -- Safe curves for Elliptic Curve Cryptography [pdf]plus-squareeprint.iacr.orgexternal-linkmessage-square0linkfedilinkarrow-up15
arrow-up15external-linkBernstein and Lange -- Safe curves for Elliptic Curve Cryptography [pdf]plus-squareeprint.iacr.orgsolrize@lemmy.world · 1 year agomessage-square0linkfedilink