Follow
Home
Blog
News
CV
Code
Contact
Follow
Home
Blog
News
CV
Code
Contact
News Archive
Page 1069 of 1117
iacr.org
A General Randomness Reuse Framework for First-Order Secure Masking and Applications on AES Design Using Randomness Solely for Input Encoding
10 days ago
by iacr.org
iacr.org
Practical SNARGs for Matrix Multiplications over Encrypted Data
10 days ago
by iacr.org
magicall.online
via
lobste.rs
Magicall: end-to-end encrypted videoconferencing in the browser, now in alpha
10 days ago
by nadim
12 points
11 comments
jeffgeerling.com
via
www.jeffgeerling.com
Local Email Debugging with Mailpit
10 days ago
by jeff@jeffgeerling.com (Jeff Geerling)
view on www.jeffgeerling.com
tinyhack.com
via
news.ycombinator.com
Implementing a web server in a single printf() call (2014)
10 days ago
by nateb2022
80 points
8 comments
iacr.org
EHDSA: Elliptic Curve-Based Homomorphic Digital Signature Algorithm with Isomorphic Message Mapping
10 days ago
by iacr.org
iacr.org
Subversion-resilient Key-exchange in the Post-quantum World
10 days ago
by iacr.org
iacr.org
HIC is all you need: Practical Post-Quantum Password-Authenticated Public Key Encryption
10 days ago
by iacr.org
iacr.org
IND-CCA Lattice Threshold KEM under 30 KiB
10 days ago
by iacr.org
iacr.org
FABS: Fast Attribute-Based Signatures
10 days ago
by iacr.org
iacr.org
Multi-Instance Unrecoverability of iMHF-Based Password Hashing
10 days ago
by iacr.org
iacr.org
Grover-Based Quantum Attack on Atom
10 days ago
by iacr.org
iacr.org
Fully Dynamic Verifiable Secret Sharing and its Application to DPSS
10 days ago
by iacr.org
iacr.org
HIGH: Harnessing GPU Parallelism for Optimized HQC Performance
10 days ago
by iacr.org
iacr.org
Efficient Threshold ML-DSA
10 days ago
by iacr.org
iacr.org
Accelerating HQC with Additive FFT
10 days ago
by iacr.org
iacr.org
Qurrency: a quantum-secure, private, and auditable platform for digital assets
10 days ago
by iacr.org
iacr.org
Aborting Random Oracles: How to Build them, How to Use them
10 days ago
by iacr.org
iacr.org
EGC-Stream: Design, Cryptanalysis, and Hardware Evaluation of an Expander-Graph-Based Stream Cipher
10 days ago
by iacr.org
iacr.org
Third-Party Moderation of Abuse Reports for End-to-End Encrypted Messaging with Multiple Moderators
10 days ago
by iacr.org
← Newer
Page 1069 of 1117
Older →
Back to Home
Copyright © 2026
Ryan X. Charles