Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Ed25519-CLI – command-line interface for the Ed25519 signature system (cr.yp.to)
1 point by INGELRII 1 day ago | past | discuss
NSA and IETF, part 3: Dodging the issues at hand (cr.yp.to)
316 points by upofadown 35 days ago | past | 229 comments
NSA and IETF, Part 2 (cr.yp.to)
16 points by zdw 35 days ago | past | 4 comments
cdb.cr.yp.to (new version of cdb) (cr.yp.to)
2 points by 1vuio0pswjnm7 57 days ago | past
Notes by djb on using Fil-C (cr.yp.to)
365 points by transpute 57 days ago | past | 246 comments
Notes by djb on using Fil-C with Debian multiarch (cr.yp.to)
10 points by fanf2 59 days ago | past
MODPOD: The collapse of IETF's protections for dissent (cr.yp.to)
8 points by gjvc 66 days ago | past
Cdb: Add support for cdb64 (cr.yp.to)
86 points by kreco 68 days ago | past | 26 comments
64-bit release of CDB by DJB (cr.yp.to)
2 points by howerj 69 days ago | past
Fast, constant-time, correct: pick three – Daniel J. Bernstein [pdf] (cr.yp.to)
8 points by nabla9 82 days ago | past
The collapse of IETF's protections for dissent (cr.yp.to)
5 points by Y_Y 84 days ago | past
MODPOD: The collapse of IETF's protections for dissent (cr.yp.to)
10 points by zdw 84 days ago | past | 1 comment
NSA and IETF: Can an attacker purchase standardization of weakened cryptography? (cr.yp.to)
251 points by zdw 85 days ago | past | 109 comments
Surreptitious Surveillance (cr.yp.to)
2 points by tatersolid 89 days ago | past
Surreptitious Surveillance (cr.yp.to)
5 points by nabla9 3 months ago | past
Some thoughts on security after ten years of qmail 1.0 (2007) [pdf] (cr.yp.to)
2 points by JNRowe 3 months ago | past
Complaint regarding a declaration of consensus to adopt a non-hybrid draft [pdf] (cr.yp.to)
2 points by Perseids 4 months ago | past
Debunking NIST's calculation of the Kyber-512 security level (2023) (cr.yp.to)
59 points by RA2lover 6 months ago | past | 21 comments
McEliece standardization: Looking at what's happening, and analyzing rationales (cr.yp.to)
5 points by 1vuio0pswjnm7 7 months ago | past
The cryptoint library (DJB) [pdf] (cr.yp.to)
4 points by frutiger 8 months ago | past
McEliece Standardisation (cr.yp.to)
2 points by quadhome 8 months ago | past
The Cryptoint Library [pdf] (cr.yp.to)
4 points by todsacerdoti 8 months ago | past
McEliece standardization: Looking at what's happening, and analyzing (cr.yp.to)
3 points by nabla9 8 months ago | past | 1 comment
The McEliece cryptosystem – Daniel J. Bernstein (talk slides) [pdf] (cr.yp.to)
2 points by nabla9 9 months ago | past | 2 comments
Entropy Attacks (cr.yp.to)
102 points by todsacerdoti 9 months ago | past | 32 comments
PQConnect: "TLS is a very large programming project." [pdf] (cr.yp.to)
3 points by 1vuio0pswjnm7 11 months ago | past
Looking at some claims that quantum computers won't work (cr.yp.to)
68 points by gjvc 11 months ago | past | 53 comments
Automated proof of the transcendence of π in HOL light (cr.yp.to)
3 points by keepamovin on Dec 15, 2024 | past
The sins of the 90s: Questioning a puzzling claim about mass surveillance (cr.yp.to)
243 points by ibotty on Oct 28, 2024 | past | 193 comments
D. J. Bernstein (cr.yp.to)
2 points by gone35 on Oct 22, 2024 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: