Private Keys in the Fortigate Leak

Cracking a 512-bit DKIM key for less than $8 in the cloud

Verified post-quantum cryptography on the web

EU's Digital Identity Systems - Reality Check and Techniques for Better Privacy

Denuvo Analysis

The GPU, not the TPM, is the root of hardware DRM

Post-quantum public-key encryption: what’s it all about?

crypto-bigint v0.6.0: a big integer library designed with constant-time algorithms for cryptography

Three mistakes from Dart/Flutter's weak PRNG

Colliding with the SHA prefix of Linux's initial Git commit