Making SLH-DSA 10x-100x Faster
conduition.io·6h
🔗Hash Algorithms
Flag this post
10000
jro.sg·18h
📦Executable Size
Flag this post
Playing with cryptography
voboda.bearblog.dev·1d
🔗Hash Functions
Flag this post
<p>**Abstract:** This paper introduces Hyper-Dynamic Semantic Scrambling for Adaptive Cybersecurity Defense (HDSS-ACD), a novel framework leveraging real-time s...
freederia.com·11h
🛡️Security Type Systems
Flag this post
Refined Linear Approximations for ARX Ciphers and Their Application to ChaCha
eprint.iacr.org·1d
🔗Hash Functions
Flag this post
Weekly Bookmarks
inkdroid.org·1h
🪢Rope Data Structures
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.com·1d
🔗Hash Functions
Flag this post
Building a Distributed Database in Elixir (Part 2: Architecture and the Beam)
📡Erlang BEAM
Flag this post
Built Bittorrent in go
🕸️P2P Protocols
Flag this post
eBPF Rootkit
🛡️Parser Security
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
🏷️Memory Tagging
Flag this post
Lang’s theorem — Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.com·10h
🧮Combinator Calculus
Flag this post
I built my own local-first Ring Doorbell with an ESP32
xda-developers.com·15h
⏲️Embedded GC
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
🏷️Memory Tagging
Flag this post
Loading...Loading more...