Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Encrypting files with passkeys and age

Encrypting Files with Passkeys and Age

The FIPS 140-3 Go Cryptographic Module

Age verification doesn't need to be a privacy footgun

How to prove false statements: Practical attacks on Fiat-Shamir

Announcing FOKS, the Federated Open Key Service

Computer Scientists Figure Out How to Prove Lies

Frequently Asked Questions about FHE

Nadim Kobeissi's Applied Cryptography Course

A Wide Reduction Trick (2022)

Running a Certificate Transparency log

Applied Cryptography: comprehensive, novel course materials released under Creative Commons

CoverDrop: Blowing the Whistle Through A News App

RFC 9799: ACME Extensions for ".onion"

Quantum Scientists Have Built a New Math of Cryptography

Crypto 101 – Introductory course on cryptography (2017)

The State of Post-Quantum Cryptography (PQC) on the Web

Visual Cryptography in Rust

New blockchain Petoron Core (ADC). Proprietary architecture and cryptography. No API. No token. Just code and a proprietary P2P network.

Why Can't We Break Cryptography?

A deep-dive explainer on Ink and Switch's BeeKEM protocol

A deep-dive explainer on Ink and Switch's BeeKEM protocol

Spoofing OpenPGP.js signature verification

A bit more on Twitter/X's new encrypted messaging

Show HN: Ariadne – A Rust implementation of aperiodic cryptography

hcl - A high level cryptography library based on libsodium

Symbolic Memory with Read-Once Collapse Behavior for In-RAM Cryptography and Key Exchange

PAKE-Bench: Benchmarking OPAQUE, PAKE etc based off elliptic curve cryptography:  Critiques and Suggestions

1975 paper : Generators for Certain Alternating Groups With Applications to Cryptography

The cryptography behind passkeys

More →