| 31. | | Going Bark: A Furry's Guide to End-to-End Encryption (soatok.blog) |
| 6 points by some_furry on Nov 14, 2020 | past | 1 comment |
|
| 32. | | A Brief Introduction to Deniability (soatok.blog) |
| 5 points by some_furry on Nov 4, 2020 | past |
|
| 33. | | Bizarre Design Choices in Zoom's End-to-End Encryption (soatok.blog) |
| 47 points by some_furry on Oct 28, 2020 | past |
|
| 34. | | Dead Ends in Cryptanalysis: Length Extension Attacks (soatok.blog) |
| 1 point by some_furry on Oct 7, 2020 | past |
|
| 35. | | Dead Ends in Cryptanalysis: Length Extension Attacks (soatok.blog) |
| 3 points by some_furry on Oct 7, 2020 | past |
|
| 36. | | Show HN: Constant-Time Algorithm Implementations in TypeScript (github.com/soatok) |
| 1 point by some_furry on Oct 5, 2020 | past |
|
| 37. | | Show HN: Constant-Time-JS – Constant-Time Algorithms in TypeScript (github.com/soatok) |
| 2 points by some_furry on Oct 1, 2020 | past | 1 comment |
|
| 38. | | Show HN: Constant-Time-JS – Constant-Time Algorithms in TypeScript (github.com/soatok) |
| 1 point by some_furry on Sept 29, 2020 | past |
|
| 39. | | EduTech Spyware Is Still Spyware: Proctorio Edition (soatok.blog) |
| 26 points by some_furry on Sept 12, 2020 | past | 9 comments |
|
| 40. | | Designing New Cryptography for Non-Standard Threat Models (soatok.blog) |
| 30 points by some_furry on Sept 9, 2020 | past | 2 comments |
|
| 41. | | Invisible Salamanders in AES-GCM-SIV (keymaterial.net) |
| 5 points by some_furry on Sept 8, 2020 | past |
|
| 42. | | Guide to Cryptographic Side-Channel Attacks (soatok.blog) |
| 2 points by some_furry on Aug 31, 2020 | past |
|
| 43. | | Soatok's Guide to Side-Channel Attacks (soatok.blog) |
| 2 points by some_furry on Aug 28, 2020 | past |
|
| 44. | | Soatok's Guide to Side-Channel Attacks (soatok.blog) |
| 1 point by some_furry on Aug 27, 2020 | past |
|
| 45. | | Dorking Your Way to Search Results That Don't Suck (soatok.blog) |
| 1 point by some_furry on Aug 10, 2020 | past |
|
| 46. | | Show HN: Minisign-PHP – Cryptographically sign/verify files (for PHP developers) (github.com/soatok) |
| 2 points by some_furry on Aug 8, 2020 | past |
|
| 47. | | Kerlissions: Trivial Collisions in Iota's Hash Function (Kerl) (soatok.blog) |
| 4 points by some_furry on July 15, 2020 | past |
|
| 48. | | Add test vectors to demonstrate kerlissions in Kerl hash function (Iota) (github.com/iotaledger) |
| 1 point by some_furry on July 15, 2020 | past |
|
| 49. | | SIGRed: Exploiting a 17 Year-Old Bug in Windows DNS Servers (checkpoint.com) |
| 9 points by some_furry on July 14, 2020 | past |
|
| 50. | | GNU: A Heuristic for Bad Cryptography (soatok.blog) |
| 22 points by some_furry on July 13, 2020 | past | 22 comments |
|
| 51. | | GNU: A Heuristic for Bad Cryptography (soatok.blog) |
| 17 points by some_furry on July 8, 2020 | past | 1 comment |
|
| 52. | | Guide to Transition into a Tech Career Without Prior Experience for Nearly $0 (soatok.blog) |
| 1 point by some_furry on June 30, 2020 | past |
|
| 53. | | Minerva: The curse of ECDSA nonces (cryptography) [pdf] (iacr.org) |
| 2 points by some_furry on June 21, 2020 | past |
|
| 54. | | Putting the “Fun” in “Hash Function” (soatok.blog) |
| 3 points by some_furry on June 20, 2020 | past |
|
| 55. | | A Better Way for Programmers to Learn Cryptography (soatok.blog) |
| 2 points by some_furry on June 16, 2020 | past |
|
| 56. | | Why AES-GCM Sucks (Cryptography) (soatok.blog) |
| 1 point by some_furry on June 15, 2020 | past |
|
| 57. | | A Better Way for Programmers to Learn Cryptography (soatok.blog) |
| 3 points by some_furry on June 15, 2020 | past |
|
| 58. | | How to Learn Cryptography as a Programmer (soatok.blog) |
| 1 point by some_furry on June 12, 2020 | past |
|
| 59. | | How to Learn Cryptography as a Programmer (soatok.blog) |
| 1 point by some_furry on June 10, 2020 | past |
|
| 60. | | How to Learn Cryptography as a Programmer (soatok.blog) |
| 9 points by some_furry on June 10, 2020 | past | 1 comment |
|
|
| More |