tinycrypt.wordpress.com October 2017
10/04/2017
Secure Two-Party Computation with Fairness -- A Necessary Design Principle
eprint.iacr.org October 2017
Gimli: Statement regarding "Cryptanalysis of 22 1/2 rounds of Gimli"
gimli.cr.yp.to September 2017
Improving the sphincs post-quantum signature scheme, part 2
research.kudelskisecurity.com September 2017
Improving the sphincs post-quantum signature scheme, part 1
research.kudelskisecurity.com September 2017
Cloudflare introduces Geo Key Manager, using Identity Based Encryption
blog.cloudflare.com September 2017
Vale: Verifying High-Performance Cryptographic Assembly Code (Usenix17)
www.youtube.com September 2017
Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX (USENIX17)
www.youtube.com September 2017
Finding Bugs in Cryptographic Hash Function Implementations
eprint.iacr.org September 2017
Google's sponsored research on browser's security: Cure53 and X41 reports
www.blog.google September 2017
Disruptive Cryptography: Post-Quantum & Machine Learning With Encrypted Data
blog.cloudflare.com September 2017