en.wikipedia.org August 2016
08/23/2016
Crypto 2016: Provable Security for Symmetric Cryptography
bristolcrypto.blogspot.com August 2016
Crypto 2016: A subfield lattice attack on overstretched NTRU assumptions
bristolcrypto.blogspot.com August 2016
Difference between lightweight, online and low memory Authenticated Encryption schemes
crypto.stackexchange.com August 2016
Cabinet of curiosities: A bunch of cryptographic protocol oddities
blog.bjrn.se August 2016
High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem
eprint.iacr.org August 2016