Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
White-Box Attacks on PhotoDNA Perceptual Hash Function
(
iacr.org
)
1 point
by
_____k
4 days ago
|
past
|
discuss
Vulnerabilities in Signal Sealed Sender and Usernames
(
iacr.org
)
5 points
by
Arathorn
6 days ago
|
past
|
discuss
A Comparative Security Analysis of Three Cloud-Based Password Managers [pdf]
(
iacr.org
)
1 point
by
PaulHoule
12 days ago
|
past
|
1 comment
A Comparative Security Analysis of Three Cloud-Based Password Managers
(
iacr.org
)
1 point
by
u1hcw9nx
16 days ago
|
past
|
2 comments
Security Analysis of Forward Secure Log Sealing in Journald [pdf]
(
iacr.org
)
1 point
by
Phelinofist
24 days ago
|
past
A Comparative Security Analysis of Three Cloud-Based Password Managers [pdf]
(
iacr.org
)
1 point
by
Brajeshwar
26 days ago
|
past
A Comparative Security Analysis of Three Cloud-Based Password Managers
(
iacr.org
)
2 points
by
u1hcw9nx
26 days ago
|
past
|
1 comment
Vulnerabilities in cloud-based password managers [pdf]
(
iacr.org
)
5 points
by
leobdkr
26 days ago
|
past
|
2 comments
Zero Knowledge (About) Encryption: Security Analysis of Cloud Password Managers
(
iacr.org
)
3 points
by
gnabgib
26 days ago
|
past
False Assurance in Formally Verified Cryptographic Libraries
(
iacr.org
)
2 points
by
st_goliath
27 days ago
|
past
Zero Knowledge Encryption: Analysis of Three Cloud-based Password Managers
(
iacr.org
)
3 points
by
abiro
27 days ago
|
past
Ask Your Cryptographer If Context-Committing AEAD Is Right for You
(
iacr.org
)
1 point
by
u1hcw9nx
43 days ago
|
past
Break Me If You Can – Attacks Against 3DES/AES NFC Technologies
(
iacr.org
)
2 points
by
netsec_burn
49 days ago
|
past
Qurrency: A quantum-secure, private, and auditable platform for digital assets
(
iacr.org
)
1 point
by
shorsher
54 days ago
|
past
L for the Price of One: On the Benefits of Using more than t+1 Parties in Thres [pdf]
(
iacr.org
)
1 point
by
todsacerdoti
57 days ago
|
past
Parallelizable threshold ECDSA with more than t+1 parties
(
iacr.org
)
1 point
by
badcryptobitch
57 days ago
|
past
Hax: Verifying Security-Critical Rust Software Using Multiple Provers
(
iacr.org
)
2 points
by
forks
57 days ago
|
past
From collisions to chosen-prefix collisions, applied to full SHA-1 [pdf]
(
iacr.org
)
1 point
by
fanf2
80 days ago
|
past
|
1 comment
Ask Your Cryptographer If Context-Committing AEAD Is Right for You
(
iacr.org
)
3 points
by
nabla9
3 months ago
|
past
IACR 2025 election cannot be verified due to lost decryption key
(
iacr.org
)
2 points
by
T3OU-736
3 months ago
|
past
|
1 comment
IACR Election 2025 Update
(
iacr.org
)
6 points
by
layer8
3 months ago
|
past
International Crypto Association elections botched by loss of key
(
iacr.org
)
8 points
by
tomgag
3 months ago
|
past
|
3 comments
SoK: Blockchain Oracles Between Theory and Practice
(
iacr.org
)
1 point
by
altro
3 months ago
|
past
A Systematic Analysis of the Juniper Dual EC Incident (2016) [pdf]
(
iacr.org
)
2 points
by
mooreds
4 months ago
|
past
On the Distribution of the Distances of Random Words
(
iacr.org
)
3 points
by
quantumgarbage
4 months ago
|
past
|
1 comment
Security Mesh Monitoring Using Low-Cost, Embedded Time Domain Reflectometry
(
iacr.org
)
2 points
by
ahlCVA
4 months ago
|
past
Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical
(
iacr.org
)
1 point
by
nabla9
4 months ago
|
past
High-Throughput Universally Composable Threshold FHE Decryption
(
iacr.org
)
2 points
by
badcryptobitch
4 months ago
|
past
Practical seed recovery for the PCG pseudo-random number generator
(
iacr.org
)
3 points
by
fanf2
5 months ago
|
past
|
1 comment
Lookup Table Arguments Systematization of Knowledge
(
iacr.org
)
3 points
by
altro
5 months ago
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: