Register, vote, and volunteer to make an impact during U.S. 2020 elections. Learn more.

linksfor.dev(s)

Posts for 'cryptography'

  1. Using Azure RBAC with Azure Key Vault
  2. Top 10 .NET 5.0 new APIs - NDepend
  3. Why not rust for security?
  4. On the use of a life
  5. Introducing Precursor « bunnie's blog
  6. A Thanksgiving Carol
  7. Cryptography Services
  8. GNSS Jamming and Spoofing, aka Galileo's Authentication Algorithm Part 3 - Articles
  9. Your Phone Is Your Castle – Purism
  10. Support ECDiffieHellman on X509Certificate2 by vcsjones · Pull Request #42180 · dotnet/runtime
  11. coin_artist – 34700 $coin Puzzle Write-Up ($20,000)
  12. Security by Obscurity is Underrated
  13. Oracle Developer Live—Java
  14. Preventing Insecure Network Connections | Apple Developer Documentation
  15. Key exchange standards - Manning
  16. Key exchange standards - Manning
  17. A history of elliptic curves in tweets
  18. Everything You Need to Know to Get Started with Deno
  19. Using Digital Signatures to check integrity of cipher texts in ASP.NET Core Razor Pages
  20. Why I’m Writing A Book On Cryptography
  21. Soatok’s Guide to Side-Channel Attacks
  22. Taking a look at Gerät 32620 — The Postface
  23. Cryptologie | Links
  24. Zero-Knowledge Proofs from Information-Theoretic Proof Systems - Part I | ZKProof Standards
  25. So you want to roll your own crypto?
  26. Call For Presentations – PasswordsCon
  27. Providers | PrivacyTools
  28. Saving the Web With Very Small Amounts of Money
  29. Cross-platform cryptography in .NET Core and .NET 5
  30. NuGet and long file name support · Issue #3324 · NuGet/Home
  31. Cryptography Dispatches
  32. Encrypting texts for an Identity in ASP.NET Core Razor Pages using AES and RSA
  33. N O D E
  34. reMarkable microSD
  35. Obfuscating your email on the web
  36. Symmetric and Asymmetric Encryption in .NET Core
  37. JWTs: Which Signing Algorithm Should I Use?
  38. Introduction to quantum computing with Q# – Part 6, No-cloning theorem
  39. IBM Reveals Next-Generation IBM POWER10 Processor
  40. Hiding messages in x86 binaries using semantic duals
  41. Stateful Hash-Based Signatures | CSRC | CSRC
  42. The “Easiest” Paths to Product Management
  43. If the NSA has been hacking everything, how has nobody seen them coming?
  44. The Five P Framework for Product Discovery
  45. terrajobst/HarvestPlatformSupport
  46. Proof of X
  47. WASM: Add MD5 and SHA* hash functions by akoeplinger · Pull Request #40486 · dotnet/runtime
  48. 1Password for Linux development preview
  49. David Wong Portfolio
  50. David Wong
  51. Announcing Windows 10 Insider Preview Build 20170 | Windows Experience Blog
  52. The Haskell Elephant in the Room
  53. Addressing the July 2020 e-commerce and marketing data breach -- A Message From Ledger’s Leadership | Ledger
  54. Small Mailserver Best Current Practices
  55. p410n3 blog
  56. Add CBOR property-based tests by eiriktsarpalis · Pull Request #39828 · dotnet/runtime
  57. Akeyless Vault Review: Intuitive Secrets Management Solution for Your DevOps Workflow
  58. Exploring Fully Homomorphic Encryption
  59. Creating Elliptical Curve Keys using OpenSSL
  60. Cryptography Dispatches: DSA Is Past Its Prime
  61. Made 13 Dollars with Brave and Basic Attention token
  62. Raspberry Pi as a Penetration Testing Implant (Dropbox) - System Overlord
  63. dotnet/designs
  64. pimbrouwers/Falco
  65. How SHA-2 Works Step-By-Step (SHA-256)
  66. Hacking Reolink cameras for fun and profit
  67. Hackers Take Over Apple, Uber, Prominent Crypto Twitter Accounts in Simultaneous Attack - CoinDesk
  68. DRBG: rename the DRBG taxonomy. · openssl/openssl@ce3080e
  69. Data Structures & Algorithms I Actually Used Working at Tech Companies
  70. All .Net Exceptions List
  71. A few thoughts about Signal’s Secure Value Recovery
  72. crypto_stories.md
  73. [tl;dr sec] #42 - tl;dr sec Search, Towards Trusted Sensing, Root Causes of Procrastination
  74. braver-browser/braver-browser
  75. Youtube DELETED Jordan Pier's Electronics Repair Channel!
  76. Performance Improvements via Formally-Verified Cryptography in Firefox – Mozilla Security Blog
  77. Why I’m Writing A Book On Cryptography
  78. Bitcoin From Scratch - Part 1
  79. How CDNs Generate Certificates
  80. How to get the best out of your Yubikey with GPG
  81. US Senators Introduce 'Lawful Access to Encrypted Data Act' — With Backdoor Mandate | News Bitcoin News
  82. Blackballed by PayPal, Scientific-Paper Pirate Takes Bitcoin Donations - CoinDesk
  83. Why AES-GCM Sucks
  84. There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK.
  85. Path Building vs Path Verifying: The Chain of Pain
  86. How is NSA breaking so much crypto?
  87. Teach Yourself Computer Science
  88. How I Got My 7 Person Startup Featured In Entrepreneur Magazine - David Kemmerer
  89. Let's Encrypt: Senior Software Engineer
  90. 11 User Authentication · Real-World Cryptography MEAP V07
  91. Reverse Engineering Snapchat (Part I): Obfuscation Techniques
  92. Zoom to Introduce New Censorship Features After Doing China's Bidding
  93. Reasoning by Lego: The wrong way to think about cryptography.
  94. jbp.io :: Third-party audit of rustls
  95. A collection of free books from Springer
  96. Never Hertz to Ask
  97. Getting Started with Nix
  98. ECDSA: Handle with Care
  99. dotnet/pinvoke
  100. 25 Years of PHP History
  101. After 10 Years in Tech Isolation, I'm Now Outsider to Things I Once Had Mastered
  102. Container technologies at Coinbase
  103. Why Is Grayscale Buying 100% Of The Mined Bitcoins Since Halving - Hamad Dar's Blog
  104. Ladies and Gentlemen… Cloudflare TV!
  105. Byzantine and non-Byzantine distributed systems
  106. mimoo/disco
  107. (Very) Basic Intro To Elliptic Curve Cryptography
  108. The radix 2^51 trick
  109. Node v12.17.0 (LTS) | Node.js
  110. Start House
  111. Home automation and Bitcoin?
  112. NIST Special Publication 800-63-3
  113. User authentication with passwords, What’s SRP?
  114. OpenBSD 6.7
  115. ACME End User Client and Code Signing Certificates
  116. Cryptology ePrint Archive: Report 2020/572
  117. The Janet Programming Language
  118. Replacing JWTs with Branca and PASETO in .NET Core
  119. Credential Loading and the AWS SDK for .NET (Deep Dive) - Steve Gordon
  120. Lockdown Course: Introduction to Cryptography - James Grime
  121. Zoom buys Keybase to help it build end-to-end encryption
  122. Archive
  123. Alternatives to PGP
  124. Keybase joins Zoom
  125. Create a .NET Core Deamon app that calls MSGraph with a certificate
  126. OpenPGP Message Format
  127. Why not "Why not WireGuard?"
  128. Vietnam's contact tracing app broadcasting a fixed ID
  129. Barbie typewriter
  130. Build a C# App with CockroachDB and the .NET Npgsql Driver
  131. This is what end-to-end encryption should look like! - Jitsi
  132. Engineering code quality in the Firefox browser: A look at our tools and challenges – Mozilla Hacks - the Web developer blog
  133. Hardware Solutions To Highly-Adversarial Environments Part 3: Trusted Execution Environment (TEE), SGX, TrustZone and Hardware Security Tokens
  134. 500 Free Computer Science Courses from the World’s Top CS Universities
  135. Is BGP safe yet? · Cloudflare
  136. ‎TF Podcast on Apple Podcasts
  137. Using Certificates from Azure Key Vault in ASP.NET Core
  138. This is what end-to-end encryption should look like! - Jitsi
  139. The limitations of Android N Encryption
  140. The Power of Prolog
  141. Transport Layer Security (TLS) best practices with the .NET Framework
  142. Welcome · Real-World Cryptography MEAP V05
  143. FLOPPY DISK OVERDRIVE, by MASTER BOOT RECORD
  144. How we recovered over $300K of Bitcoin
  145. Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
  146. Perspectives & gaps between theory, practice & industry research in cryptography
  147. A Deep Dive into Database Attacks [Part III]: Why Scarlett Johansson’s Picture Got My Postgre Database to Start Mining Monero
  148. .NET R&D Digest (March, 2020)
  149. Plan for change: TLS 1.0 and TLS 1.1 soon to be disabled by default - Microsoft Edge Blog
  150. US Government Wages War on Encryption
  151. Linux 5.6 - Linus Torvalds
  152. patents in crypto
  153. Hardware Solutions To Highly-Adversarial Environments - Whitebox Crypto vs TPM vs TEE vs Secure Enclaves vs Secure Elements vs HSM vs CloudHSM vs KMS
  154. Speeding up Linux disk encryption
  155. A categorized list of all Java and JVM features since JDK 8 to 14
  156. Deploying security.txt: how Cloudflare’s security team builds on Workers
  157. .NET Platforms Feature Comparison | Premier Developer
  158. A Quick Garbled Circuits Primer
  159. White-Box Cryptography
  160. How Tailscale works
  161. EARN IT bill is aiming at destroying encryption. We must take action now.
  162. gentilkiwi Shop | Redbubble
  163. US Politicians Want to Ban End-to-End Encryption on Messaging Services like Telegram and Whatsapp - Bitcoin News
  164. MakerDAO gets stress tested as ETH price plummets
  165. Pylon Validation Services
  166. What's a key exchange?
  167. Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt
  168. Keybase
  169. MYBP (Maybe You’ve Been Pwned)
  170. Enhancing Pwned Passwords Privacy with Padding
  171. Existence is random [JavaScript code to efficiently generate a random (version 4) UUID]
  172. WireGuard Gives Linux a Faster, More Secure VPN
  173. Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers
  174. Stack Exchange Data Explorer
  175. The Art of Zero Knowledge: Zero-Knowledge Proofs for Set Membership | ZKProof Standards
  176. Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months
  177. If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?
  178. Am I generating email link tokens correctly?
  179. Hash functions and security | Manning
  180. Ivan On Tech on Programming in Solidity, C++, and Javascript - Cryptographic Asset
  181. home | CFAIL
  182. Provisioning X.509 Devices for Azure IoT Hub using .NET Core
  183. Cryptologie
  184. X25519 in Web Cryptography · Issue #271 · mozilla/standards-positions
  185. February 2020 SDK Release
  186. Hash functions and security | Manning
  187. Latacora - Stop Using Encrypted Email
  188. Peter Lawrence Montgomery, 1947-2020
  189. Real-World Cryptography
  190. google/tink
  191. This Goes to Eleven (Part. 2/∞)
  192. London Crypto Day 2020
  193. Create Certificates for IdentityServer4 signing using .NET Core
  194. Creating Certificates for X.509 security in Azure IoT Hub using .NET Core
  195. Serious Cryptography | No Starch Press
  196. Authentication, What The Fuck?
  197. Permutation-based Cryptography 2020 – Zagreb, Croatia
  198. Showtime | BenchmarkDotNet
  199. NorthSec 2020
  200. Workshops | Insomni'Hack
  201. Whose Curve Is It Anyway
  202. Critical Windows 10 vulnerability used to Rickroll the NSA and Github
  203. 18.783 Home
  204. Real World Crypto 2020
  205. Supersingular Isogeny Key Exchange for Not-Quite Beginners
  206. SHA-1 is a Shambles
  207. FROST — Flexible Round-Optimized Schnorr Threshold Signatures | Cryptography, Security, and Privacy (CrySP) | University of Waterloo
  208. The Curious Case of WebCrypto Diffie-Hellman on Firefox - Small Subgroups Key Recovery Attack on DH
  209. The Hidden Number Problem – kel.bz
  210. $1000 TCR hashing competition
  211. Crypto exchange Poloniex denies data leak after resetting passwords for some users
  212. Vim cryptmethod is not authenticated · Issue #638 · vim/vim
  213. On Linux's Random Number Generation
  214. Difference between shamir secret sharing (SSS) vs Multisig vs aggregated signatures (BLS) vs distributed key generation (dkg) vs threshold signatures
  215. tmds/Tmds.Ssh
  216. Introducing “Have I been pwned?” – aggregating accounts across website breaches
  217. VPN Service for Serious Privacy & Security | IVPN
  218. GateHub Investigation - Final Statement
  219. Stop surveillance and preserve your privacy with IVPN
  220. TPM-FAIL Attack
  221. Isogeny crypto
  222. Homepage | ZKProof Standards
  223. Maintaining cryptographic library for 12 languages
  224. Real World Crypto 2020 Program
  225. NordVPN users’ passwords exposed in mass credential-stuffing attacks
  226. cfrg/pake-selection
  227. TLS Post-Quantum Experiment
  228. Have I Been Pwned: API v3
  229. Creating Random Numbers With .NET Core
  230. cr.yp.to: 2019.10.24: Why EdDSA held up better than ECDSA against Minerva
  231. Meet Algo, the VPN that works
  232. Writing a book is hard
  233. Ed25519 Keys | Brian Warner
  234. The Lines of Code That Changed Everything
  235. Resistance - The First Anonymous DEX and Privacy-Oriented Blockchain
  236. The Insecure Elephant in the Room - CA Security Council
  237. Grant Types — IdentityServer4 1.0.0 documentation
  238. Algorand's cryptographic sortition
  239. novotnyllc/NuGetKeyVaultSignTool
  240. What's my birthday?
  241. CryptographicException on .NET Core 3, Windows only "The specified RSA parameters are not valid; both Exponent and Modulus are required fields." · Issue #30914 · dotnet/runtime
  242. Cutter
  243. What's new in .NET Core 3.0
  244. draft-ietf-quic-transport-23 - QUIC: A UDP-Based Multiplexed and Secure Transport
  245. September 10, 2019—KB4515384 (OS Build 18362.356)
  246. awslabs/s2n
  247. OWASP/CheatSheetSeries
  248. 10 Personal Finance Lessons for Technology Professionals
  249. OpenSSL PRNG is not (really) fork-safe - Martin Boßlet
  250. cr.yp.to: 2017.07.23: Fast-key-erasure random-number generators
  251. jedisct1/dsvpn
  252. Major Crypto Brokerage Coinmama Reports 450,000 Users Affected by Data Breach
  253. Padloc - A Modern Password Manager For Individuals And Teams
  254. Please do not use the .NET 2.0 HMACSHA512 and HMACSHA384 Classes
  255. !(Spotting the promising cryptography-related start ups)
  256. Random Thoughts
  257. JDK 13 Security Enhancements
  258. Pwnie Awards
  259. Security Engineering - A Guide to Building Dependable Distributed Systems
  260. Sometimes valid RSA signatures in .NET
  261. Manning Publications
  262. CRYPTO-LAB
  263. Deprecation errors compiling native projects on macOS Catalina · Issue #30109 · dotnet/runtime
  264. Real-World Cryptography
  265. Using Chained Certificates for Certificate Authentication in ASP.NET Core 3.1
  266. Kraken
  267. Cryptocurrency in Every Wallet™ | Best Place To Buy Sell Store Crypto | Crypto.com
  268. Archive
  269. POSIX close(2) is broken
  270. Add methods to convert between hexadecimal strings and bytes · Issue #17837 · dotnet/runtime
  271. The Ultra Secure Crypto Storage & Communication Device
  272. A book in preparation
  273. Security advisory 2019-06-13 | Yubico
  274. Certificate Authentication in ASP.NET Core 3.1
  275. Apple's 'Find My' Feature Uses Some Very Clever Cryptography
  276. Apple CryptoKit | Apple Developer Documentation
  277. Cryptography and Your Apps - WWDC 2019 - Videos - Apple Developer
  278. Building Facebook's service encryption infrastructure - Facebook Engineering
  279. How Hackers Get your Password? | Dr. Erdal Ozkaya Personal Blog
  280. Cryptography Dispatches • Buttondown
  281. JED Server Security Incident Report
  282. SMS for 2FA: What Are Your Security Options? - Authy
  283. Enable C# mode command line diff by terrajobst · Pull Request #1196 · dotnet/standard
  284. Kik and the SEC: What’s Going On and What Does It Mean for Crypto? - Andreessen Horowitz
  285. [Cryptography] Bitcoin - closing the coin
  286. Why 2f+1
  287. Seven Trends in Blockchain Computing (Spring 2019)
  288. Round 1 Candidates - Lightweight Cryptography | CSRC
  289. nothings/single_file_libs
  290. dotnet/extensions
  291. RFC 8551 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
  292. microsoft/SymCrypt
  293. JDK 12 Security Enhancements
  294. Five Open Problems for the Blockchain Computer - Andreessen Horowitz
  295. proposal: crypto/tls: Expose maps for cipher suite IDs/names · Issue #30325 · golang/go
  296. Dream Market Shuts Down: Has the DEA Claimed Another Darknet Victim?
  297. Cryptologie
  298. Lies, darn lies and sampling bias
  299. Verified cryptographic provider a triple threat
  300. .NET API browser
  301. ITHare/obf
  302. A Go implementation of Poly1305 that makes sense
  303. Archive
  304. BoringTun, a userspace WireGuard implementation in Rust
  305. Possible bug with RSACng hash verification · Issue #29061 · dotnet/runtime
  306. gRPC Bi-directional streaming with Razor Pages and a Hosted Service gRPC client
  307. The WhibOx Contest Edition 2 - CYBERCRYPT
  308. On the S-Box of Streebog and Kuznyechik
  309. Understanding STIR/SHAKEN
  310. Include System.Security.Cryptography.RandomNumberGenerator.GetInt32 · Issue #1101 · dotnet/standard
  311. Go 1.12 Release Notes - The Go Programming Language
  312. Steam :: Steamworks Development :: Steamworks SDK v1.44 - New Networking APIs
  313. We need to talk about Session Tickets
  314. Cybersecurity for the Public Interest - Schneier on Security
  315. Added Range Manipulation APIs to Collection<T> and ObservableCollection<T> by ahoefling · Pull Request #35772 · dotnet/corefx
  316. Past, Present, Future: From Co-ops to Cryptonetworks - Andreessen Horowitz
  317. Data Leakage from Encrypted Databases - Schneier on Security
  318. a16z Podcast: Voting, Security, and Governance in Blockchains - Andreessen Horowitz
  319. Introducing Anchorage, the world’s first crypto-native custodian
  320. What comes after open source?
  321. Blockchain Can Wrest the Internet From Corporations' Grasp
  322. Crypto, Beyond Silk Road - Andreessen Horowitz
  323. Crypto, the Future of Trust
  324. Beyond Cryptocurrencies - Andreessen Horowitz
  325. 4 eras of blockchain computing: degrees of composability
  326. The Four Horsemen of Centralization, by Ali Yahya
  327. Centralization vs Decentralization - AVC
  328. Presentation: The End of the Beginning — Benedict Evans
  329. The Myth of The Infrastructure Phase | Union Square Ventures
  330. From Crimefighter to ‘Crypto’: Meet the Woman in Charge of Venture Capital’s Biggest Gamble
  331. a16z Crypto - Andreessen Horowitz
  332. a16z Crypto - Andreessen Horowitz
  333. a16z Crypto - Andreessen Horowitz
  334. a16z Crypto - Andreessen Horowitz
  335. a16z Podcast: Scaling Companies (and Tech Trends) - Andreessen Horowitz
  336. Katie Haun - Andreessen Horowitz
  337. a16z Crypto - Andreessen Horowitz
  338. SEC.gov | Digital Asset Transactions: When Howey Met Gary (Plastic)
  339. A #CryptoIntro — Resources & Wrap Up
  340. Welcome Balaji Srinivasan, Coinbase’s new Chief Technology Officer
  341. Crypto Canon - Andreessen Horowitz
  342. a16z Podcast: Mental Models for Understanding Crypto Tokens - Andreessen Horowitz
  343. Vitalik Buterin, Creator Of Ethereum, On The Big Guy Vs. The Little Guy - Unchained Podcast
  344. Our Top 16+ Podcasts of 2017 - Andreessen Horowitz
  345. The Future of Tech, with Chris Dixon – [Invest Like the Best, EP.69]
  346. dYdX raises seed round led by Andreessen Horowitz and Polychain Capital
  347. Decrypting Crypto, From Bitcoin and Blockchain to ICOs - Andreessen Horowitz
  348. Welcome Asiff Hirji: Coinbase’s New President & Chief Operating Officer
  349. Blockchain Governance: Programming Our Future
  350. Field Notes: Devcon3 - Ethereum Developer's Conference - Andreessen Horowitz
  351. Keybase launches encrypted git
  352. a16z Podcast: Why Crypto Tokens Matter - Andreessen Horowitz
  353. Bitcoin's Academic Pedigree - ACM Queue
  354. Blockchains don’t scale. Not today, at least. But there’s hope.
  355. How Information Got Re-Invented - Issue 51: Limits - Nautilus
  356. Traditional Asset Tokenization
  357. Traditional Asset Tokenization
  358. Digital currency reading list
  359. Maryam Mirzakhani, mathematician and Fields Medal winner, dies at Stanford | Stanford News
  360. Computer Logic with Chris Dixon - Software Engineering Daily
  361. Details on Recent DNS Hijacking - Schneier on Security
  362. Reconstructing SIGSALY - Schneier on Security
  363. Blockchain and Trust - Schneier on Security
  364. Hacking the GCHQ Backdoor - Schneier on Security
  365. Friday Squid Blogging: Squid Lollipops - Schneier on Security
  366. Evaluating the GCHQ Exceptional Access Proposal - Schneier on Security
  367. Friday Squid Blogging: New Giant Squid Video - Schneier on Security
  368. New Australian Backdoor Law - Schneier on Security
  369. Back Issues of the NSA's Cryptolog - Schneier on Security
  370. Security Risks of Chatbots - Schneier on Security
  371. The DoJ's Secret Legal Arguments to Break Cryptography - Schneier on Security
  372. Friday Squid Blogging: Squid Sculptures - Schneier on Security
  373. oss-security - MatrixSSL stack buffer overflow
  374. Modern Alternatives to PGP
  375. Go 1.12 Release Notes - The Go Programming Language
  376. Archive
  377. proposal: x/crypto: deprecate unused, legacy and problematic packages · Issue #30141 · golang/go
  378. Real World Crypto 2019 - Day 1 - Session 1 - Morning - part 1
  379. crypto/x509: root_cgo_darwin and root_nocgo_darwin omit some system certs · Issue #24652 · golang/go
  380. crypto/tls: add support for TLS 1.3 · Issue #9671 · golang/go
  381. CBC 2019
  382. Real World Crypto 2019
  383. The year in post-quantum crypto
  384. Lecture: The year in post-quantum crypto | Friday | Schedule 35th Chaos Communication Congress
  385. ImperialViolet - CECPQ2
  386. SPY --- Surveillance, Privacy, and You
  387. Quantum algorithms for analysis of public-key crypto | American Inst. of Mathematics
  388. Mathematics of Public Key Cryptography
  389. CRYPTO 2018: “Middle Ground” Proposals for a Going-Dark Fix
  390. Programme
  391. PQCRYPTO ICT-645622
  392. D. J. Bernstein / Talks
  393. djbsort: Intro
  394. Security in Times of Surveillance
  395. Round 1 Submissions - Post-Quantum Cryptography | CSRC
  396. Selected Areas in Cryptography (SAC) 2018 | University of Calgary |
  397. Eurocrypt 2018 rump session
  398. Classic McEliece: Talks
  399. NIST PQCrypto Classic McEliece submission
  400. PQCrypto 2018 Conference : Florida Atlantic University - Charles E. Schmidt College of Science
  401. libpqcrypto: Intro
  402. Security in Times of Surveillance
  403. Introducing HacSpec
  404. Accepted Papers : Florida Atlantic University - Charles E. Schmidt College of Science
  405. Post-Quantum Cryptography
  406. Post-Quantum Cryptography
  407. CBC Workshop 2018 : Florida Atlantic University - Charles E. Schmidt College of Science
  408. SPHINCS+
  409. The ROBOT Attack
  410. NTRU Prime: NIST submission
  411. dalek-cryptography/ed25519-dalek
  412. The CCC: Men Who Hate Women
  413. Mersenne Prime Discovery - 2^82589933-1 is Prime!
  414. RUB-NDS/TLS-Padding-Oracles
  415. Cryptologie | Links
  416. crypto/tls: enable TLS 1.3 and update tests · golang/go@30cc978
  417. Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson – Gigaom
  418. Database Encryption
  419. Kerckhoffs’ principles – Why should I make my cipher public?
  420. Proxy re-encryption and FHE with NuCypher
  421. Cryptologie | Links
  422. Attack of the week: searchable encryption and the ever-expanding leakage function
  423. Archive
  424. Introducing Adiantum: Encryption for the Next Billion Users
  425. Zcash Counterfeiting Vulnerability Successfully Remediated - Electric Coin Company
  426. Stanford Blockchain Conference 2019 - Day 1
  427. arXiv.org e-Print archive
  428. DEF CON® 27 Hacking Conference - Call For Papers
  429. Earn BAT while trying out the blockchain-friendly Brave browser
  430. Meow Hash
  431. Announcing .NET Core 3 Preview 1 and Open Sourcing Windows Desktop Frameworks | .NET Blog
  432. Manning Publications
  433. Software Tokens Won't Save You