| 1. | | Authenticated Dictionaries with Skip Lists and Commutative Hashing (kel.bz) |
| 3 points by kkl on Jan 5, 2020 | past |
|
| 2. | | RSA-Based Key Encapsulation Mechanisms (kel.bz) |
| 1 point by kkl on May 27, 2019 | past |
|
| 3. | | Building lattice reduction (LLL) intuition (kel.bz) |
| 81 points by kkl on July 25, 2017 | past | 7 comments |
|
| 4. | | The Goldreich–Goldwasser–Halevi (GGH) Cryptosystem (kel.bz) |
| 2 points by kkl on April 26, 2017 | past |
|
| 5. | | Some challenges in post-quantum standardization (cr.yp.to) |
| 3 points by kkl on Oct 31, 2016 | past |
|
| 6. | | Why PKCS#1v1.5 Signature Should (Also) Be Put Out of Our Misery (cryptosense.com) |
| 1 point by kkl on Aug 9, 2016 | past |
|
| 7. | | Executing non-alphanumeric JavaScript without parentheses (portswigger.net) |
| 123 points by kkl on July 15, 2016 | past | 19 comments |
|
| 8. | | Encrypted Email Obstacles and Experiments (moderncrypto.org) |
| 1 point by kkl on June 13, 2016 | past |
|
| 9. | | Web Storage: the lesser evil for session tokens (portswigger.net) |
| 195 points by kkl on May 31, 2016 | past | 69 comments |
|
| 10. | | Security challenges for the Qubes build process (invisiblethings.org) |
| 64 points by kkl on May 30, 2016 | past | 17 comments |
|
| 11. | | BLESS: SSH Certificate Authority for Ephemeral SSH Sessions (github.com/netflix) |
| 54 points by kkl on May 21, 2016 | past | 18 comments |
|
| 12. | | Signal Protocol and Deniable Authentication (praetorian.com) |
| 3 points by kkl on May 17, 2016 | past |
|
| 13. | | A Systematic Analysis of the Juniper Dual EC Incident (iacr.org) |
| 1 point by kkl on April 15, 2016 | past |
|
| 14. | | Scalable vendor security reviews (googleonlinesecurity.blogspot.com) |
| 1 point by kkl on March 7, 2016 | past |
|
| 15. | | Go Proverbs Illustrated (gregosuri.com) |
| 3 points by kkl on Jan 3, 2016 | past |
|
| 16. | | Duplicate Signature Key Selection Attack in Let's Encrypt (agwa.name) |
| 71 points by kkl on Dec 12, 2015 | past | 4 comments |
|
| 17. | | Duplicate Signature Key Selection Attack in Let's Encrypt (agwa.name) |
| 5 points by kkl on Dec 2, 2015 | past |
|
| 18. | | Secure Password Hash Algorithm Migrations (kel.bz) |
| 3 points by kkl on Nov 27, 2015 | past |
|
| 19. | | Where the Science Is Taking Us in Cybersecurity (tinho.net) |
| 1 point by kkl on May 5, 2015 | past |
|
| 20. | | Why You Should Add Joern to Your Source Code Audit Toolkit (praetorian.com) |
| 2 points by kkl on Sept 10, 2014 | past |
|