The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1
eprint.iacr.org·2d
📡Side-Channel Attacks
Flag this post
ZkML Breakthrough: 13B Models Verified in 15 Minutes
lightcapai.medium.com·3d·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
A Security Model for Systemd
lwn.net·4h·
🐛Vulnerability Research
Flag this post
On Reed–Solomon Proximity Gaps Conjectures
eprint.iacr.org·17h
🔒Cryptography
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
jstrieb.github.io·1d·
🐛Vulnerability Research
Flag this post
A Note on Notes: Towards Scalable Anonymous Payments via Evolving Nullifiers and Oblivious Synchronization
eprint.iacr.org·4d
📡Side-Channel Attacks
Flag this post
Mathematics solves problems by pen and paper. CS helps us to go far beyond that
cacm.acm.org·3d·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
Build your own GPG in Rust
andrewhalle.github.io·3d·
Discuss: Hacker News
🦀Rust
Flag this post
Show HN: Kumi – a portable, declarative, functional core for business logic
kumi-play-web.fly.dev·18h·
Discuss: Hacker News
Formal Methods
Flag this post
Multivariate Commitments and Signatures with Efficient Protocols
eprint.iacr.org·3d
🔒Cryptography
Flag this post
Credentials Evidence or Simulate
preludes.eu·2d·
Discuss: Hacker News
🔒Cryptography
Flag this post
A Noob's Guide to Kubernetes Monitoring: SigNoz vs. Datadog vs. Grafana
simpletechguides.com·5h·
Discuss: Hacker News
🔒Cryptography
Flag this post
Happy Eyeballs Version 3: Better Connectivity Using Concurrency
datatracker.ietf.org·8h·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
OIDC workload identity on AWS
latacora.com·1d·
Discuss: Hacker News
🔒Cryptography
Flag this post
Dennis Ritchie's story of dabbling in the cryptographic world
web.archive.org·51m·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
An overview of the PPPP protocol for IoT cameras
palant.info·22h·
Discuss: Hacker News
🔒Cryptography
Flag this post
Show HN: KnexBridge – Generate TypeScript and Zod Types from Knex DB
github.com·2h·
Discuss: Hacker News
🦀Rust
Flag this post
are-dependent-types-actually-erased
chadnauseam.com·3d·
Discuss: Hacker News
Formal Methods
Flag this post
Australia Mandates Encryption Backdoors
wired.com·10h·
Discuss: Hacker News
🔒Cryptography
Flag this post
New Asymptotic Results on Predicting Non-linear Polynomial Congruential Generators
eprint.iacr.org·1d
📡Side-Channel Attacks
Flag this post