www.cs.purdue.edu last month
01/14/2019
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification
Csidh: Post-quantum Key Exchange Using Isogeny-based Group Actions
www.esat.kuleuven.be last month
Mihir Bellare and Eric Rescorla won the Levchin Prize
press-release.levchinprize.com last month
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
eprint.iacr.org last month
The Dark Side of Zero Knowledge: Undetectable Backdoor in zk-SNARK
blog.smartdec.net last month
NSA person in Real World Crypto audience reacts to Simon and Speck fiasco
youtu.be last month
Attacking end-to-end email encryption: Efail, other attacks and lessons learned.
media.ccc.de last month
Provable Security: How I learned to stop worrying and love the backdoor
media.ccc.de last month
seeing theory: a visual introduction to probability and statistics
seeing-theory.brown.edu last month
Ledger donjon wins kudelski security crypto challenge: behind the scene 1/3
research.kudelskisecurity.com December 2018