SoK: Systematizing Hybrid Strategies for the Transition to Post-Quantum Cryptography
eprint.iacr.orgยท4d
๐open source
Flag this post
FreedomFest 2025 -- Naomi Brockwell, Beginner's Introduction to Privacy : CSPAN3 : November 10, 2025 8:59pm-9:24pm EST
archive.orgยท1h
๐ขmathematics
Flag this post
The Builder's Notes: Your CFO Just Called โ Except It's a $2.4M Deepfake and Your AI Approved It
pub.towardsai.netยท1d
๐open source
Flag this post
Auth Series: Yet Another Password Authentication Flow.. but hear me out
๐open source
Flag this post
Derek Elkins: Umbral Calculus
hedonisticlearning.comยท1d
๐ขmathematics
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
๐ขmathematics
Flag this post
Getting Started With Queryable Encryption With the MongoDB EF Core Provider
๐open source
Flag this post
FSF EU Notarization Complaint
mjtsai.comยท7h
๐open source
Flag this post
How good is AI at Hacking AD?
๐open source
Flag this post
Forwarding packets at scale - Building a Cloud Data Plane using eBPF/XDP (denog17)
cdn.media.ccc.deยท10h
๐open source
Flag this post
These are still the most popular passwords around - and surely, we can do better than this as a species
techradar.comยท1d
๐open source
Flag this post
LLM side-channel attack could allow snoops to guess what you're talking about
theregister.comยท3h
๐open source
Flag this post
Deep Learning for Molecules and Materials
๐ขmathematics
Flag this post
Optimization of Information Reconciliation for Decoy-State Quantum Key Distribution over a Satellite Downlink Channel
arxiv.orgยท22h
๐ขmathematics
Flag this post
Cyberattackers are getting more evasive: How can defenders keep up?
siliconrepublic.comยท12h
๐open source
Flag this post
Loading...Loading more...