Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology
Japanese spy gear and special weapons: How Noborito’s scientists and technicians served in the Second World War and the Cold War
tandfonline.com·15h
CERT-UA warns UAC-0245 targets Ukraine with CABINETRAT backdoor
securityaffairs.com·1d
Expert: Europe should wage information warfare inside Russia
sverigesradio.se·13h
The Analyst’s Gambit: A Second Course in Functional Analysis
noncommutativeanalysis.wordpress.com·20h
Museum of Living in Communism in Brașov, Romania
atlasobscura.com·11h
When Nova introduced hacking to the mainstream
dfarq.homeip.net·13h
Quantum key distribution method tested in urban infrastructure offers secure communications
phys.org·1d
Equality Without Feminism?
nybooks.com·1d
What Makes a Language Look Like Itself?
towardsdatascience.com·1d
Group Theory Day in Budapest
cameroncounts.wordpress.com·1d
Loading...Loading more...