Exploiting the Potential of Linearity in Automatic Differentiation and Computational Cryptography
arxiv.org·2w
🔢Number Theory
Flag this post
Cryptography for developers
dev.to·1w·
Discuss: DEV
🔢Number Theory
Flag this post
Golden: Lightweight Non-Interactive Distributed Key Generation
eprint.iacr.org·3w
🔢Number Theory
Flag this post
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·3w·
Discuss: Hacker News
🔢Number Theory
Flag this post
Kubernetes and Etcd Are Not Secure, Until Now
personal-website-3bm.pages.dev·3w·
Discuss: Hacker News
🔢Number Theory
Flag this post
TikTok Programming - Security Algorithms
github.com·3w·
🔢Number Theory
Flag this post
How to Securely Store Passwords in a Database
blog.algomaster.io·1w
🌐WebAssembly
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
dev.to·1w·
Discuss: DEV
🔢Number Theory
Flag this post
Why Signal’s post-quantum makeover is an amazing engineering achievement
arstechnica.com·3w·
🔢Number Theory
Flag this post
Bitcoin and the Quantum Problem – Part I: Discrete Logs are Hard - Nic Carter
stacker.news·2w·
Discuss: Substack
🔢Number Theory
Flag this post
Paillier Cryptosystem
en.wikipedia.org·1w·
Discuss: Hacker News
🔢Number Theory
Flag this post
The limits of zero-knowledge for age-verification
brave.com·1d
🔢Number Theory
Flag this post
The Privacy Theater of Hashed PII
matthodges.com·2w·
🔢Number Theory
Flag this post
ZKP
dev.to·3w·
Discuss: DEV
🔢Number Theory
Flag this post
Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556)
botanica.software·2w·
Discuss: Hacker News
🔢Number Theory
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·6d
🌐WebAssembly
Flag this post
Verifiable Delay Functions: A brief and gentle introduction
medium.com·1w·
Discuss: Hacker News
🔢Number Theory
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.org·1w·
Discuss: Hacker News
🔢Number Theory
Flag this post
Understanding Hashing: The Backbone of Data Integrity in Cybersecurity
dev.to·5d·
Discuss: DEV
🔢Number Theory
Flag this post
Improving the Trustworthiness of JavaScript on the Web
blog.cloudflare.com·2w·
Discuss: Hacker News
🌐WebAssembly
Flag this post