Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

The cryptography behind passkeys

Tuscolo Static Certificate Transparency Log

Go’s FIPS 140-3 Compliance

Go Cryptography Security Audit

Forget IPs: using cryptography to verify bot and agent traffic

Post-Quantum Cryptography on NetBSD

Post-Quantum Cryptography Comes to Windows Insiders and Linux | Microsoft Community Hub

Chinese firm launches ‘unhackable’ quantum cryptography system

What the heck is AEAD again?

Audit of the Rust p256 Crate

When Gandhi met Satoshi

15,000 lines of verified cryptography now in Python

A New Kali Linux Archive Signing Key

McEliece standardization

The cryptoint library

Intuiting TLS

Cloudflare - Prepping for post-quantum: a beginner’s guide to lattice cryptography

Oracle: Preparing for Post Quantum Cryptography

Quantum-Safe Cryptography

Show HN: Signum – Kotlin Multiplatform Cryptography and PKI Library

Alkindi – Lightweight Post-Quantum Cryptography Library

Decoding the 90s: Cryptography in Early Software Development (2023)

Entropy Attacks

Chunking Attacks on File Backup Services Using Content-Defined Chunking [pdf]

Operationalizing Macaroons

CDC attack mitigation in Plakar

Zero-Knowledge Proofs

Chunking attacks on Tarsnap (and others)

Constant-Time Code: The Pessimist Case [pdf]

The Practical Limitations of End-to-End Encryption

More →