www.imperialviolet.org March 2018
03/12/2018
How Someone Tried to Exploit a Flaw in Our Smart Contract and Steal All of Its Ether
blog.citymayor.co March 2018
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
blog.acolyer.org February 2018
Signal becomes a nonprofit foundation with 50 million USD funding
signal.org February 2018
Fast Fully Homomorphic Evaluation of Neural Networks in the Cloud
ecrypt-eu.blogspot.com February 2018
secure coding: understanding input validation
littlemaninmyhead.wordpress.com February 2018
When Textbook RSA is Used to Protect the Privacy of Hundreds of Millions of Users
arxiv.org February 2018
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks
eprint.iacr.org February 2018
Homomorphic Encryption: Adding Numbers Securely (using HA and FA)
www.youtube.com February 2018
The Keccak team has a new Gimli-like permutation called Xodoo
tinycrypt.wordpress.com February 2018
So you want to work in security? (and for some reason ended up here rather than reading other people’s posts on the topic).
ifsec.blogspot.co.uk February 2018
Stanford Seminar - Exploiting modern microarchitectures: Meltdown, Spectre, & other hardware attacks
www.youtube.com February 2018