eprint.iacr.org February 2019
02/11/2019 02/10/2019
A Pragmatic Introduction to Secure Multi-Party Computation
securecomputation.org February 2019
Introducing Adiantum: Encryption for the Next Billion Users
security.googleblog.com February 2019
Introducing Sonic: A Practical zk-SNARK with a Nearly Trustless Setup
www.benthamsgaze.org February 2019
Go implementation of OPAQUE (hidden password user registration and auth)
github.com February 2019
Quantum computing as a field is obvious bullshit
scottlocklin.wordpress.com February 2019
Australian government clamping down on security research, academic says
www.computerworld.com.au February 2019
Rogaway: Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys (2006)
eprint.iacr.org February 2019
Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process
nvlpubs.nist.gov February 2019
How the L0pht (probably) optimized attack against the LanMan hash.
modexp.wordpress.com February 2019
Differential Privacy: A Primer for a Non-technical Audience
privacytools.seas.harvard.edu January 2019
The (Almost) Secret Algorithm Researchers Used to Break Thousands of RSA Keys
algorithmsoup.wordpress.com January 2019