The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1
eprint.iacr.org·2d
📡Side-Channel Attacks
Flag this post
A Security Model for Systemd
🐛Vulnerability Research
Flag this post
On Reed–Solomon Proximity Gaps Conjectures
eprint.iacr.org·13h
🔒Cryptography
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
🐛Vulnerability Research
Flag this post
A Note on Notes: Towards Scalable Anonymous Payments via Evolving Nullifiers and Oblivious Synchronization
eprint.iacr.org·4d
📡Side-Channel Attacks
Flag this post
Mathematics solves problems by pen and paper. CS helps us to go far beyond that
📡Side-Channel Attacks
Flag this post
Build your own GPG in Rust
🦀Rust
Flag this post
Show HN: Kumi – a portable, declarative, functional core for business logic
✅Formal Methods
Flag this post
Multivariate Commitments and Signatures with Efficient Protocols
eprint.iacr.org·2d
🔒Cryptography
Flag this post
Credentials Evidence or Simulate
🔒Cryptography
Flag this post
Australia Mandates Encryption Backdoors
🔒Cryptography
Flag this post
are-dependent-types-actually-erased
✅Formal Methods
Flag this post
New Asymptotic Results on Predicting Non-linear Polynomial Congruential Generators
eprint.iacr.org·1d
📡Side-Channel Attacks
Flag this post
Loading...Loading more...