SampCert: Verified Foundations for Differential Privacy (PLDI 2025)
dl.acm.org·3h·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
On Reed–Solomon Proximity Gaps Conjectures
eprint.iacr.org·1d
🔒Cryptography
Flag this post
The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1
eprint.iacr.org·2d
📡Side-Channel Attacks
Flag this post
ZkML Breakthrough: 13B Models Verified in 15 Minutes
lightcapai.medium.com·4d·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
A Security Model for Systemd
lwn.net·11h·
🐛Vulnerability Research
Flag this post
How Tiles Works – Tiles Privacy
blog.tiles.run·27m·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
jstrieb.github.io·1d·
🐛Vulnerability Research
Flag this post
A Note on Notes: Towards Scalable Anonymous Payments via Evolving Nullifiers and Oblivious Synchronization
eprint.iacr.org·4d
📡Side-Channel Attacks
Flag this post
Mathematics solves problems by pen and paper. CS helps us to go far beyond that
cacm.acm.org·4d·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
Build your own GPG in Rust
andrewhalle.github.io·3d·
Discuss: Hacker News
🦀Rust
Flag this post
Leaving PyTorch and Meta
soumith.ch·1h·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
Show HN: Kumi – a portable, declarative, functional core for business logic
kumi-play-web.fly.dev·1d·
Discuss: Hacker News
Formal Methods
Flag this post
Multivariate Commitments and Signatures with Efficient Protocols
eprint.iacr.org·3d
🔒Cryptography
Flag this post
Credentials Evidence or Simulate
preludes.eu·3d·
Discuss: Hacker News
🔒Cryptography
Flag this post
A Noob's Guide to Kubernetes Monitoring: SigNoz vs. Datadog vs. Grafana
simpletechguides.com·12h·
Discuss: Hacker News
🔒Cryptography
Flag this post
Happy Eyeballs Version 3: Better Connectivity Using Concurrency
datatracker.ietf.org·15h·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
OIDC workload identity on AWS
latacora.com·2d·
Discuss: Hacker News
🔒Cryptography
Flag this post
Marden's Theorem
en.wikipedia.org·6h·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
Proton a new Linux kernel module for crypto functions callable from XDP
github.com·5h·
Discuss: Hacker News
🔒Cryptography
Flag this post
original ↗
jamesoclaire.com·20h·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post