Time needed to factor large integers
johndcook.com·23h·
Discuss: Hacker News
🌊Stream Ciphers
Module 3 — Derived Digital Identities and Interoperability
dev.to·11h·
Discuss: DEV
🔐PKI Archaeology
Discrete Fourier Transform
nima101.github.io·1d·
Discuss: Hacker News
📐Error Bounds
Quantum error correction codes enable efficient scaling to hundreds of thousands of qubits
phys.org·1d
⚛️Quantum Error Correction
High-level intuitions for the Bulletproofs/IPA protocol
cryptologie.net·4d
🎯Performance Proofs
Quantum Entanglement Unlocks Unbreakable Randomness for Next-Gen Cryptography
hackernoon.com·17h
🔐Quantum Security
Using an LLM on the Advent of Code
funcall.blogspot.com·1d·
⚔️Lean Tactics
WireTap: Breaking Server SGX via DRAM Bus Interposition
wiretap.fail·1h·
Discuss: Hacker News
🛡️RISC-V Security
An FPGA-Based Mechanical Keyboard
hackaday.com·3h
⌨️Mechanical Keyboards
Proving the Infinitude of Primes in Knuckledragger
philipzucker.com·3d
🧮Theorem Proving
Holosplit
atdotde.blogspot.com·4h·
🔧KAITAI
Defending LLM applications against Unicode character smuggling
aws.amazon.com·22h
🔤Character Encoding
FreeBSD Security Advisory FreeBSD-SA-25:08.openssl
bsdsec.net·22h
🐡OpenBSD
Germany's government wants to replace passwords with passkeys
techradar.com·3h
🔐Swedish Cryptography
SBFA: Single Sneaky Bit Flip Attack to Break Large Language Models
arxiv.org·2d
🧪Binary Fuzzing
Running your own HashDB lookup
cyber.wtf·1d
Archive Checksums
Hiding room metadata from servers
element.io·23h·
Discuss: Lobsters
🔐Homomorphic Encryption
TOTOLINK X6000R: Three New Vulnerabilities Uncovered
unit42.paloaltonetworks.com·4h
🛡️eBPF Security
Why TigerBeetle is the most interesting database in the world
amplifypartners.com·3h·
🗄️Database Internals
3rd Largest Element: SIMD Edition
parallelprogrammer.substack.com·17h·
Discuss: Substack
SIMD Optimization