Exploiting the Potential of Linearity in Automatic Differentiation and Computational Cryptography
arxiv.org·2w
🔢Number Theory
Flag this post
Cryptography for developers
🔢Number Theory
Flag this post
Golden: Lightweight Non-Interactive Distributed Key Generation
eprint.iacr.org·3w
🔢Number Theory
Flag this post
TikTok Programming - Security Algorithms
🔢Number Theory
Flag this post
How to Securely Store Passwords in a Database
blog.algomaster.io·1w
🌐WebAssembly
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
🔢Number Theory
Flag this post
Why Signal’s post-quantum makeover is an amazing engineering achievement
🔢Number Theory
Flag this post
Bitcoin and the Quantum Problem – Part I: Discrete Logs are Hard - Nic Carter
🔢Number Theory
Flag this post
Paillier Cryptosystem
🔢Number Theory
Flag this post
The limits of zero-knowledge for age-verification
brave.com·1d
🔢Number Theory
Flag this post
The Privacy Theater of Hashed PII
🔢Number Theory
Flag this post
ZKP
🔢Number Theory
Flag this post
Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556)
🔢Number Theory
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·6d
🌐WebAssembly
Flag this post
A Brief History of the Cypherpunk Movement
🔢Number Theory
Flag this post
Loading...Loading more...