Hacker Newsnew | past | comments | ask | show | jobs | submit | kkl's submissionslogin
1.Authenticated Dictionaries with Skip Lists and Commutative Hashing (kel.bz)
3 points by kkl on Jan 5, 2020 | past
2.RSA-Based Key Encapsulation Mechanisms (kel.bz)
1 point by kkl on May 27, 2019 | past
3.Building lattice reduction (LLL) intuition (kel.bz)
81 points by kkl on July 25, 2017 | past | 7 comments
4.The Goldreich–Goldwasser–Halevi (GGH) Cryptosystem (kel.bz)
2 points by kkl on April 26, 2017 | past
5.Some challenges in post-quantum standardization (cr.yp.to)
3 points by kkl on Oct 31, 2016 | past
6.Why PKCS#1v1.5 Signature Should (Also) Be Put Out of Our Misery (cryptosense.com)
1 point by kkl on Aug 9, 2016 | past
7.Executing non-alphanumeric JavaScript without parentheses (portswigger.net)
123 points by kkl on July 15, 2016 | past | 19 comments
8.Encrypted Email Obstacles and Experiments (moderncrypto.org)
1 point by kkl on June 13, 2016 | past
9.Web Storage: the lesser evil for session tokens (portswigger.net)
195 points by kkl on May 31, 2016 | past | 69 comments
10.Security challenges for the Qubes build process (invisiblethings.org)
64 points by kkl on May 30, 2016 | past | 17 comments
11.BLESS: SSH Certificate Authority for Ephemeral SSH Sessions (github.com/netflix)
54 points by kkl on May 21, 2016 | past | 18 comments
12.Signal Protocol and Deniable Authentication (praetorian.com)
3 points by kkl on May 17, 2016 | past
13.A Systematic Analysis of the Juniper Dual EC Incident (iacr.org)
1 point by kkl on April 15, 2016 | past
14.Scalable vendor security reviews (googleonlinesecurity.blogspot.com)
1 point by kkl on March 7, 2016 | past
15.Go Proverbs Illustrated (gregosuri.com)
3 points by kkl on Jan 3, 2016 | past
16.Duplicate Signature Key Selection Attack in Let's Encrypt (agwa.name)
71 points by kkl on Dec 12, 2015 | past | 4 comments
17.Duplicate Signature Key Selection Attack in Let's Encrypt (agwa.name)
5 points by kkl on Dec 2, 2015 | past
18.Secure Password Hash Algorithm Migrations (kel.bz)
3 points by kkl on Nov 27, 2015 | past
19.Where the Science Is Taking Us in Cybersecurity (tinho.net)
1 point by kkl on May 5, 2015 | past
20.Why You Should Add Joern to Your Source Code Audit Toolkit (praetorian.com)
2 points by kkl on Sept 10, 2014 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: