firefly@neon.nightbulb.net · 6 months agoHeffalump Hackerz - Woozle Wizards - NIST Quantum Cryptographyplus-squareneon.nightbulb.netimagemessage-square7fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageHeffalump Hackerz - Woozle Wizards - NIST Quantum Cryptographyplus-squareneon.nightbulb.netfirefly@neon.nightbulb.net · 6 months agomessage-square7fedilink
firefly@neon.nightbulb.net · 6 months agoTimepool Random Generatorplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareTimepool Random Generatorplus-squarefirefly@neon.nightbulb.net · 6 months agomessage-square0fedilink
overflow@lemmy.ml · 6 months agoDice Random Numbers – Simon Josefsson's blogplus-squareblog.josefsson.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDice Random Numbers – Simon Josefsson's blogplus-squareblog.josefsson.orgoverflow@lemmy.ml · 6 months agomessage-square0fedilink
overflow@lemmy.ml · 7 months agoThe Fi Virtual Carrier Networkwww.gstatic.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Fi Virtual Carrier Networkwww.gstatic.comoverflow@lemmy.ml · 7 months agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 7 months agoBackdoors that let cops decrypt messages violate human rights, EU court saysplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBackdoors that let cops decrypt messages violate human rights, EU court saysplus-squarearstechnica.comArthur Besse@lemmy.mlMEnglish · 7 months agomessage-square0fedilink
overflow@lemmy.ml · 8 months agoAttack of the week: Airdrop tracingplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAttack of the week: Airdrop tracingplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml · 8 months agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 8 months agoKyberSlash: timing vulnerabilities allow recovering private keys in most Kyber implementations. patches availablekyberslash.cr.yp.toexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKyberSlash: timing vulnerabilities allow recovering private keys in most Kyber implementations. patches availablekyberslash.cr.yp.toArthur Besse@lemmy.mlMEnglish · 8 months agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 10 months ago28 years later, ETSI's TETRA committee unanimously votes to open source their secret encryption algorithmsplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link28 years later, ETSI's TETRA committee unanimously votes to open source their secret encryption algorithmsplus-squarewww.theregister.comArthur Besse@lemmy.mlMEnglish · 10 months agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 10 months agoPassive SSH RSA Key Compromise via Latticesplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPassive SSH RSA Key Compromise via Latticesplus-squareeprint.iacr.orgArthur Besse@lemmy.mlMEnglish · 10 months agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 10 months agoNearly-finalized eIDAS legislation requires browsers to trust state-issued CAs, and prohibits using certificate transparency to prevent abuses of them: only ETSI-approved authenticity checks allowed.plus-squarelast-chance-for-eidas.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNearly-finalized eIDAS legislation requires browsers to trust state-issued CAs, and prohibits using certificate transparency to prevent abuses of them: only ETSI-approved authenticity checks allowed.plus-squarelast-chance-for-eidas.orgArthur Besse@lemmy.mlMEnglish · 10 months agomessage-square0fedilink
Settolino 𓁣@fed.dyne.org · edit-210 months agoCrypto power to the people! plus-squarefed.dyne.orgimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageCrypto power to the people! plus-squarefed.dyne.orgSettolino 𓁣@fed.dyne.org · edit-210 months agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · edit-211 months agoThe inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level.plus-squareblog.cr.yp.toexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level.plus-squareblog.cr.yp.toArthur Besse@lemmy.mlMEnglish · edit-211 months agomessage-square0fedilink
overflow@lemmy.ml · 1 year agoHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogoverflow@lemmy.ml · 1 year agomessage-square0fedilink
Spzi@lemm.eeEnglish · 1 year agoAES: How to Design Secure Encryption (Spanning Tree)plus-squarepiped.videoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAES: How to Design Secure Encryption (Spanning Tree)plus-squarepiped.videoSpzi@lemm.eeEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.ml · 1 year agoInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogoverflow@lemmy.ml · 1 year agomessage-square0fedilink
tedu@azorius.net · 1 year agoThe Cryptographer Who Ensures We Can Trust Our Computersplus-squarewww.quantamagazine.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Cryptographer Who Ensures We Can Trust Our Computersplus-squarewww.quantamagazine.orgtedu@azorius.net · 1 year agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 1 year agoInterview with the ETSI Standards Organization That Created TETRA "Backdoor"plus-squarezetter.substack.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInterview with the ETSI Standards Organization That Created TETRA "Backdoor"plus-squarezetter.substack.comArthur Besse@lemmy.mlMEnglish · 1 year agomessage-square0fedilink
Arthur Besse@lemmy.mlM · 1 year agoAll cops are broadcasting: breaking TETRA after decades in the shadowsplus-squarewww.midnightblue.nlexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAll cops are broadcasting: breaking TETRA after decades in the shadowsplus-squarewww.midnightblue.nlArthur Besse@lemmy.mlM · 1 year agomessage-square0fedilink
overflow@lemmy.mlEnglish · 1 year ago17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.bevideomessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1video17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.beoverflow@lemmy.mlEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.mlEnglish · 1 year agoPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.bevideomessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1videoPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.beoverflow@lemmy.mlEnglish · 1 year agomessage-square0fedilink