Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
cr.yp.to blog
blog.cr.yp.to
NSA
and
IETF
, part 7
blog.cr.yp.to
·
5w
·
Hacker News
NSA
and
IETF
, part 6
blog.cr.yp.to
·
11w
·
Hacker News
,
Hacker News
NSA
and
IETF
, part 5
blog.cr.yp.to
·
12w
·
Hacker News
NSA and
IETF
, part 3:
Dodging
the issues at hand
blog.cr.yp.to
·
24w
·
Lobsters
,
Hacker News
NSA
and
IETF
, part 4
blog.cr.yp.to
·
24w
Clang
vs.
Clang
blog.cr.yp.to
·
92w
Plagiarism
as a patent
amplifier
blog.cr.yp.to
·
94w
Bibliography
keys
blog.cr.yp.to
·
96w
NSA
,
NIST
, and post-quantum cryptography
blog.cr.yp.to
·
113w
Another way to
botch
the security analysis of
Kyber-512
blog.cr.yp.to
·
124w
Reducing "gate"
counts
for
Kyber-512
blog.cr.yp.to
·
133w
How to design an
elliptic-curve
signature system
blog.cr.yp.to
·
133w
Turbo
Boost
blog.cr.yp.to
·
152w
A
subfield-logarithm
attack against ideal lattices
blog.cr.yp.to
·
226w
NIST
's cryptographic
standardization
process
blog.cr.yp.to
·
226w
Some small
suggestions
for the Intel
instruction
set
blog.cr.yp.to
·
226w
The
Saber
cluster
blog.cr.yp.to
·
226w
Follow-You
Printing
blog.cr.yp.to
·
226w
The death of
optimizing
compilers
blog.cr.yp.to
·
226w
Reconstructing
ROCA
blog.cr.yp.to
·
226w
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help