The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1
eprint.iacr.org·2d
📡Side-Channel Attacks
Flag this post
ZkML Breakthrough: 13B Models Verified in 15 Minutes
lightcapai.medium.com·3d·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
A Security Model for Systemd
lwn.net·30m·
🐛Vulnerability Research
Flag this post
On Reed–Solomon Proximity Gaps Conjectures
eprint.iacr.org·13h
🔒Cryptography
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
jstrieb.github.io·23h·
🐛Vulnerability Research
Flag this post
A Note on Notes: Towards Scalable Anonymous Payments via Evolving Nullifiers and Oblivious Synchronization
eprint.iacr.org·4d
📡Side-Channel Attacks
Flag this post
Mathematics solves problems by pen and paper. CS helps us to go far beyond that
cacm.acm.org·3d·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
Build your own GPG in Rust
andrewhalle.github.io·2d·
Discuss: Hacker News
🦀Rust
Flag this post
Show HN: Kumi – a portable, declarative, functional core for business logic
kumi-play-web.fly.dev·13h·
Discuss: Hacker News
Formal Methods
Flag this post
Multivariate Commitments and Signatures with Efficient Protocols
eprint.iacr.org·2d
🔒Cryptography
Flag this post
Credentials Evidence or Simulate
preludes.eu·2d·
Discuss: Hacker News
🔒Cryptography
Flag this post
A Noob's Guide to Kubernetes Monitoring: SigNoz vs. Datadog vs. Grafana
simpletechguides.com·1h·
Discuss: Hacker News
🔒Cryptography
Flag this post
Happy Eyeballs Version 3: Better Connectivity Using Concurrency
datatracker.ietf.org·4h·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
An overview of the PPPP protocol for IoT cameras
palant.info·18h·
Discuss: Hacker News
🔒Cryptography
Flag this post
Australia Mandates Encryption Backdoors
wired.com·6h·
Discuss: Hacker News
🔒Cryptography
Flag this post
are-dependent-types-actually-erased
chadnauseam.com·2d·
Discuss: Hacker News
Formal Methods
Flag this post
New Asymptotic Results on Predicting Non-linear Polynomial Congruential Generators
eprint.iacr.org·1d
📡Side-Channel Attacks
Flag this post
Strong Authentication in a Post-Quantum World
kuppingercole.com·1d·
Discuss: Hacker News
🔒Cryptography
Flag this post
Show HN: Refusal-Aware Logical Framework for LLMs
github.com·1d·
Discuss: Hacker News
Formal Methods
Flag this post
What does the ideal information environment look like?
defenderofthebasic.substack.com·2d·
Discuss: Substack
📡Side-Channel Attacks
Flag this post