SampCert: Verified Foundations for Differential Privacy (PLDI 2025)
🐛Vulnerability Research
Flag this post
On Reed–Solomon Proximity Gaps Conjectures
eprint.iacr.org·1d
🔒Cryptography
Flag this post
The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1
eprint.iacr.org·2d
📡Side-Channel Attacks
Flag this post
A Security Model for Systemd
🐛Vulnerability Research
Flag this post
How Tiles Works – Tiles Privacy
📡Side-Channel Attacks
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
🐛Vulnerability Research
Flag this post
A Note on Notes: Towards Scalable Anonymous Payments via Evolving Nullifiers and Oblivious Synchronization
eprint.iacr.org·4d
📡Side-Channel Attacks
Flag this post
Mathematics solves problems by pen and paper. CS helps us to go far beyond that
📡Side-Channel Attacks
Flag this post
Build your own GPG in Rust
🦀Rust
Flag this post
Leaving PyTorch and Meta
📡Side-Channel Attacks
Flag this post
Show HN: Kumi – a portable, declarative, functional core for business logic
✅Formal Methods
Flag this post
Multivariate Commitments and Signatures with Efficient Protocols
eprint.iacr.org·3d
🔒Cryptography
Flag this post
Credentials Evidence or Simulate
🔒Cryptography
Flag this post
OIDC workload identity on AWS
🔒Cryptography
Flag this post
Marden's Theorem
📡Side-Channel Attacks
Flag this post
original ↗
📡Side-Channel Attacks
Flag this post
Loading...Loading more...