Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

A bet on whether ML-KEM-768 or X25519 will break first

Quantum computing bombshells that are not April Fools

A cryptography engineer's perspective on quantum computing timelines

Hybrid Constructions: The Post-Quantum Safety Blanket

Cloudflare targets 2029 for full post-quantum security

Accumulated Test Vectors

BrowserStack local leaking private key

Why full-stack post-quantum cryptography cannot wait

OpenSSH Post-Quantum Cryptography (2025)

We need Post-Quantum Cryptography more than ever

Secure Communication, Buried In A News App

A small proposal for mixing PQ KEMs into Noise

Disclosure of Replay Attack Vulnerability in Signed References

Node.js — Developing a minimally HashDoS resistant, yet quickly reversible integer hash for V8

SSH Certificates and Git Signing

Bruce 2.0 – A lightweight wrapper that makes the Java Cryptography API actually pleasant to use

WolfGuard: WireGuard with FIPS 140-3 cryptography

2026 Turing Award Goes To Inventors of Quantum Cryptography

Cryptography in Home Entertainment (2004)

An interactive intro to Elliptic Curve Cryptography

HiVoid – A QUIC-based proxy protocol with post-quantum cryptography

Don't use passkeys for encrypting user data

Fast Sorting, Branchless by Design

E2EE, the be all and end all of chat?

Bruteforcing the Bitwarden master password I forgor

Official specification and reference code for Fast Lightweight Online Encryption (FLOE)

Cryptographic Issues in Matrix's Rust Library Vodozemac

Show HN: If you lose your memory, how to regain access to your computer?

The Global Trust Register (1999)

Robust and efficient quantum-safe HTTPS

More →