Lang’s theorem — Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.com·10h
λLambda Encodings
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.com·1d
🔐Cryptographic Archaeology
Flag this post
Show HN: Enklayve – Free, Local, Private, and Secure Personal AI
enklayve.com·7h·
Discuss: Hacker News
🏠Homelab Compression
Flag this post
Distance Measurement Using Basys3
hackster.io·1d
🕹️Hardware Emulation
Flag this post
Hyper-Secure Code Generation via Lattice-Based Homomorphic Encryption & AI-Assisted Verification
dev.to·2d·
Discuss: DEV
🔐Homomorphic Encryption
Flag this post
The Easiest Way to Build a Type Checker
jimmyhmiller.com·12h·
Discuss: Hacker News
Bidirectional Typing
Flag this post
Cryptology Group Held an Election, but Can’t Decrypt the Results
nytimes.com·1d·
🔐Archive Cryptanalysis
Flag this post
Percona Brings Transparent Data Encryption to Postgres
thenewstack.io·1d
🗄️PostgreSQL WAL
Flag this post
Student projects in complex function theory – The Prime Number Theorem and Riemann’s paper
noncommutativeanalysis.wordpress.com·21h
⚔️Lean Theorem
Flag this post
Indefiniteness makes lattice reduction easier
arxiv.org·2d
🔗Combinatory Logic
Flag this post
RSA as a pairing
johndcook.com·4d·
Discuss: Hacker News
🔐Homomorphic Encryption
Flag this post
Windows ARM64 Internals: Deconstructing Pointer Authentication
preludesecurity.com·8h·
👑RISC-V Privilege
Flag this post
New Al Zimmermann's Programming Contests: Powerful Sums
azspcs.com·10h·
Discuss: Hacker News
🧮SMT Solvers
Flag this post
TokenHolder Hack Analysis
blog.verichains.io·17h
🎫Kerberos Attacks
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.me·2d
🔐Archive Encryption
Flag this post
Python Certifi and Custom CAs
zufallsheld.de·14h·
Discuss: Hacker News
🧪CBOR Fuzzing
Flag this post
LINE Messaging Bugs Open Asian Users to Cyber Espionage
darkreading.com·1d
🔤EBCDIC Privacy
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
security.googleblog.com·2d·
🌐WebRTC Archives
Flag this post
The Limits of Formal Security Models – Dorothy E. Denning (1999)
faculty.nps.edu·3d·
Discuss: Hacker News
🔒WASM Capabilities
Flag this post