Encryption Algorithms, Public Key Infrastructure, Digital Signatures, Hash Functions

Unclonable Cryptography in Linear Quantum Memory
arxiv.org·18h
🛡Cyber Security
Flag this post
SampCert: Verified Foundations for Differential Privacy (PLDI 2025)
dl.acm.org·1d·
Discuss: Hacker News
🧠PKM Systems
Flag this post
Consistent Hashing: The Unseen Engine
dev.to·8h·
Discuss: DEV
🧠PKM Systems
Flag this post
Workload Identity in a Multi System Environment (Wimse) Architecture
datatracker.ietf.org·1d·
Discuss: Hacker News
🛡Cyber Security
Flag this post
How Signal's New Triple Ratchet Protocol Fortifies Your Privacy
zeroday.forem.com·1d·
Discuss: DEV
🛡Cyber Security
Flag this post
The Privacy Manifesto
zac1258019.substack.com·2h·
Discuss: Substack
🛡Cyber Security
Flag this post
Bridging the gaps between protocol specifications and practice
blog.apnic.net·23h
🛡Cyber Security
Flag this post
Working on a digital vault, looking for advice or examples (zero-knowledge, cryptography, encryption)
reddit.com·12h·
Discuss: r/rust
🛡Cyber Security
Flag this post
Linux To Gain ML-DSA/Dilithium Post-Quantum Cryptography For Module Signing
phoronix.com·9h
🛡Cyber Security
Flag this post
Daniel Vérité: Producing UUIDs Version 7 disguised as Version 4 (or 8)
postgresql.verite.pro·2d
🛡Cyber Security
Flag this post
The Secrets of Cyber Security That Experts Don't Share
dev.to·15h·
Discuss: DEV
🛡Cyber Security
Flag this post
I finally found a truly private, collaborative Office suite
xda-developers.com·23m
🛡Cyber Security
Flag this post
Dennis Ritchie's story of dabbling in the cryptographic world
web.archive.org·1d·
Discuss: Hacker News
🛡Cyber Security
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptographic Threats
dev.to·13h·
Discuss: DEV
🛡Cyber Security
Flag this post
I did a Bitwarden/Vaultwarden vault backup utility tool
github.com·7h·
Discuss: r/selfhosted
🛡Cyber Security
Flag this post
Why Bcrypt Can Be Unsafe for Password Hashing?
blog.enamya.me·2d·
Discuss: Hacker News
🛡Cyber Security
Flag this post
GPTF-8: A tokenizer-based character encoding
lesswrong.com·15h
🧠PKM Systems
Flag this post