blog.benjojo.co.uk June 2015
DJB: How to design an elliptic-curve signature system
blog.cr.yp.to May 2015
If you hashed a hash an infinite number of times would you end up with a unique hash?
crypto.stackexchange.com May 2015
Adios, Hola! Or: Why You Should Immediately Uninstall Hola
adios-hola.org May 2015
Transmissions of data through time based covert channels across a network
www.anfractuosity.com May 2015
Daniel J. Bernstein: "How to manipulate standards"
projectbullrun.org May 2015
Top Academic Security & Crypto Papers from 2008 through 2013
saweis.net May 2015