Cryptology ePrint Archive: Report 2018/159
The Missing Difference Problem, and its Applications to Counter Mode Encryption
7 days ago
Cryptology ePrint Archive: Report 2018/126
Onion-AE: Foundations of Nested Encryption
14 days ago
Estimate all the {LWE, NTRU} schemes!
Complextiy estimates for running the primal-uSVP and dual attacks against all LWE-based, and the primal-uSVP attack against all NTRU-based, Round 1 schemes proposed as part of the PQC process run by NIST.
19 days ago
Cryptology ePrint Archive: Report 2016/492
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
4 weeks ago
Nuclear War Survival Skills
Lots of good activities to do with the kids in here
5 weeks ago
Scalable, transparent, and post-quantum secure computational integrity
Here we report the first realization of a transparent ZK system (ZK-STARK) in which verification scales exponentially faster than database size, and moreover, this exponential speedup in verification is observed concretely for meaningful and sequential computations, described next. Our system uses several recent advances on interactive oracle proofs (IOP), such as a “fast” (linear time) IOP system for error correcting codes.
crypto  zkp 
5 weeks ago
If you've been looking for a fast, global-search and tag-based email system to use within your text editor or in a terminal...

If you're the kind of person that gets excited about being able to write shell scripts for exploring and manipulating your email...

If you're a developer of an existing email program and would love a good library interface for fast, global search with support for arbitrary tags...
5 weeks ago
ROP Emporium
Learn return-oriented programming through a series of challenges designed to teach ROP techniques in isolation, with minimal reverse-engineering and bug-hunting.
ctf  security 
6 weeks ago
Cryptology ePrint Archive: Report 2017/1251
A toolbox for software optimization of QC-MDPC code-based cryptosystems
mceliece  crypto 
7 weeks ago
Cryptology ePrint Archive: Report 2017/666
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
crypto  messaging 
9 weeks ago
The Case for Learned Index Structures
Our initial results show, that by using neural nets we are able to outperform cache-optimized B-Trees by up to 70% in speed while saving an order-of-magnitude in memory over several real-world data sets.
10 weeks ago
« earlier      
actors advice aes agriculture ai algorithm altivec analysis apache api apple architecture arm art article asio asn.1 assembler awesome beer bitcoin blog book books boost botan brewing business c c# c++ c++11 cache capabilities cell china clang clojure cluster code coffee comic compiler compilers computers concurrency conference corruption cpu crypto cs cuda culture database datastructures dc debugging design dht distributed diy django documentation e ecc economics economy education electronics energy environment erlang essay farm farming fiction filesystem filter finance firefox food fp framework functional funny games gardening gcc gentoo git google government graphics grimmeathookfuture gtd gui hardware hashfunction haskell health history hosting housing howto humor ibm ietf intel interesting internet interview investing ipod java javascript json jvm kernel language lattices law learning library life lifehacks linux lisp logic mail management manual map maple maps math mceliece medicine memcached memory messaging microsoft military money monotone multicore music network networking news nist nsa nyc ocaml oil opensource operatingsystem optimization organization p2p pairings pake paper papers parallel parser parsing patterns paulgraham paxos peakoil people performance perl philosophy photo photography physics pir pki pkix policestate politics postfix powerpc pqcrypto prion privacy productivity programming protocol psychology python radio recipe reference reviews rfc rng rsa ruby running scala scheme science scifi search security serialization server sgx shopping sidechannel signatures simd singularity society software space spam specification sql ssl standard statistics stm storage surveillance sysadmin systems tahoe tcp technology terrorism testing theory threads tls tool toolbox tools toreview tpm travel tutorial unix usa verification vermont versioncontrol via:cryptogon video visualization web web2.0 webserver windows work writing x11 x509 x86

Copy this bookmark: