Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
IACR 2025 election cannot be verified due to lost decryption key
(
iacr.org
)
2 points
by
T3OU-736
15 days ago
|
past
|
1 comment
IACR Election 2025 Update
(
iacr.org
)
6 points
by
layer8
15 days ago
|
past
International Crypto Association elections botched by loss of key
(
iacr.org
)
8 points
by
tomgag
17 days ago
|
past
|
3 comments
SoK: Blockchain Oracles Between Theory and Practice
(
iacr.org
)
1 point
by
altro
22 days ago
|
past
A Systematic Analysis of the Juniper Dual EC Incident (2016) [pdf]
(
iacr.org
)
2 points
by
mooreds
32 days ago
|
past
On the Distribution of the Distances of Random Words
(
iacr.org
)
3 points
by
quantumgarbage
37 days ago
|
past
|
1 comment
Security Mesh Monitoring Using Low-Cost, Embedded Time Domain Reflectometry
(
iacr.org
)
2 points
by
ahlCVA
45 days ago
|
past
Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical
(
iacr.org
)
1 point
by
nabla9
48 days ago
|
past
High-Throughput Universally Composable Threshold FHE Decryption
(
iacr.org
)
2 points
by
badcryptobitch
52 days ago
|
past
Practical seed recovery for the PCG pseudo-random number generator
(
iacr.org
)
3 points
by
fanf2
54 days ago
|
past
|
1 comment
Lookup Table Arguments Systematization of Knowledge
(
iacr.org
)
3 points
by
altro
54 days ago
|
past
Subverting Telegram's end-to-end encryption (2023)
(
iacr.org
)
105 points
by
pona-a
56 days ago
|
past
|
92 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir [pdf]
(
iacr.org
)
4 points
by
todsacerdoti
3 months ago
|
past
Camera Zoom Based Cipher Encryption Scheme or Strengthen Weak Encryption
(
iacr.org
)
4 points
by
gananthraman
3 months ago
|
past
Tlock: Practical timelock encryption from threshold BLS (2023) [pdf]
(
iacr.org
)
2 points
by
wslh
3 months ago
|
past
Coral: Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs
(
iacr.org
)
1 point
by
petethomas
3 months ago
|
past
How to Prove False Statements: Practical Attacks on Fiat-Shamir
(
iacr.org
)
2 points
by
belter
4 months ago
|
past
Replication of Quantum Factorisation Records with a VIC-20, an Abacus, and a Dog
(
iacr.org
)
84 points
by
teddyh
4 months ago
|
past
|
25 comments
Replication of Quantum Factorisation Records; a Home Computer, Abacus, and a Dog
(
iacr.org
)
1 point
by
ChuckMcM
4 months ago
|
past
|
2 comments
Formal Security & Verification of Cryptographic Protocol Implementations in Rust
(
iacr.org
)
2 points
by
matt_d
4 months ago
|
past
Replication of Quantum Factorisation with an 8-Bit Computer, an Abacus and a Dog
(
iacr.org
)
3 points
by
indy
4 months ago
|
past
Replication of Quantum Factorisation Records with an 8-bit Home Computer [pdf]
(
iacr.org
)
137 points
by
sebgan
5 months ago
|
past
|
32 comments
How to Prove False Statements: Practical Attacks on Fiat-Shamir
(
iacr.org
)
6 points
by
Bluestein
5 months ago
|
past
Quantum Computing without the Linear Algebra [pdf]
(
iacr.org
)
2 points
by
adamnemecek
5 months ago
|
past
Quantum Computing without the Linear Algebra [pdf]
(
iacr.org
)
1 point
by
abhi9u
5 months ago
|
past
Quantum Computing without the Linear Algebra [pdf]
(
iacr.org
)
2 points
by
marvel_boy
5 months ago
|
past
AWS introduces key committing variant of XAES-256-GCM [pdf]
(
iacr.org
)
1 point
by
HillRat
7 months ago
|
past
OAuth Audience Injection Attacks [pdf]
(
iacr.org
)
1 point
by
mooreds
7 months ago
|
past
Traceable Verifiable Random Functions
(
iacr.org
)
2 points
by
wslh
7 months ago
|
past
Collisions for MD4, MD5, HAVAL-128 and RIPEMD (2004) [pdf]
(
iacr.org
)
2 points
by
kretaceous
7 months ago
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: