decentralizedthoughts.github.io March 2022
03/14/2022
Good-case Latency of Rotating Leader Synchronous BFT
SoK: Password-Authenticated Key Exchange -- Theory, Practice, Standardization and Real-World Lessons
eprint.iacr.org March 2022
An Illustrated Guide to Elliptic Curve Cryptography Validation
research.nccgroup.com March 2022
Cryptographers are not happy with how you’re using the word ‘crypto’
amp-theguardian-com.cdn.ampproject.org March 2022
Juniper Breach Mystery Starts to Clear With New Details on Hackers and U.S. Role
finance.yahoo.com March 2022
Part 2: Improving crypto code in Rust using LLVM’s optnone
blog.trailofbits.com March 2022
[COSE] Why you shouldn't have your crypto designed by a CEO
mailarchive.ietf.org February 2022
Why the OAuth mTLS spec is more interesting than you might think
neilmadden.blog February 2022
An Introduction to Secret-Sharing-Based Secure Multiparty Computation
eprint.iacr.org February 2022
Taurus Releases the First Open-Source Implementation of MPC-CMP
blog.taurushq.com February 2022
Learn Privacy-Enhancing Techniques with Cryptographic Games
www.manning.com February 2022
What is the funniest number in cryptography (Episode 2 )?
cryptosubtlety.medium.com February 2022
DNS Security, Part VII: Blockchain-based Name Systems and Transparency
educatedguesswork.org February 2022