Hacker News
- How does DNS work? (2002) https://cr.yp.to/djbdns/intro-dns.html 13 comments
- Two File Descriptors for Sockets http://cr.yp.to/tcpip/twofd.html 65 comments
- Boring Crypto (2015) [pdf] https://cr.yp.to/talks/2015.10.05/slides-djb-20151005-a4.pdf 25 comments
- The IPv6 mess (2002) http://cr.yp.to/djbdns/ipv6mess.html 131 comments
- Internet Mail 2000 https://cr.yp.to/im2000.html 66 comments
- How does DNS work? (2002) https://cr.yp.to/djbdns/intro-dns.html 7 comments
- Does open-source cryptographic software work correctly? [pdf] https://cr.yp.to/talks/2019.05.16/slides-djb-20190516-correctly-4x3.pdf 15 comments
- The qmail security guarantee https://cr.yp.to/qmail/guarantee.html 70 comments
- Failures in NIST’s ECC standards [pdf] https://cr.yp.to/newelliptic/nistecc-20160106.pdf 18 comments
- Placing documents into the public domain (2008) https://cr.yp.to/publicdomain.html 19 comments
- Making sure software stays insecure [pdf] http://cr.yp.to/talks/2014.07.10/slides-djb-20140710-a4.pdf 39 comments
- Cdb: a fast, reliable, simple package for creating, reading constant databases http://cr.yp.to/cdb.html 41 comments
- The IPv6 Mess http://cr.yp.to/djbdns/ipv6mess.html 37 comments
- Bernstein's New Mission Is To Cryptographically Protect Every Internet Packet http://cr.yp.to/talks/2009.06.27/slides.pdf 21 comments
Lobsters
- Rebuilding target files when source files have changed https://cr.yp.to/redo.html 2 comments programming
- Boring crypto http://cr.yp.to/talks/2015.10.05/slides-djb-20151005-a4.pdf 3 comments cryptography , pdf , security
- The IPv6 mess (2003) http://cr.yp.to/djbdns/ipv6mess.html 3 comments devops , ipv6 , networking
- Is D.J. Bernstein our world's most brilliant living programmer? https://cr.yp.to/ 2 comments programming
- Understanding binary-Goppa decoding [pdf] https://cr.yp.to/papers/goppadecoding-20220320.pdf 4 comments crypto
- A new Daniel J. Bernstein paper: “A discretization attack” [2020-09-18, pdf] https://cr.yp.to/papers/categories-20200918.pdf 12 comments crypto
- X25519 output: What to hash? https://cr.yp.to/ecdh.html 3 comments crypto
- DJB: Worried about new assumptions like Ring-LWE? Try post-quantum RSA [PDF] https://cr.yp.to/papers/pqrsa-20170419.pdf 12 comments crypto
- Daniel J. Bernstein's Some thoughts on security after ten years of qmail 1.0 [pdf, from 2007] https://cr.yp.to/qmail/qmailsec-20071101.pdf 13 comments programming
- DJB is reviewing Curve25519 paper 10 years since its publication, including original bad reviews it got https://cr.yp.to/talks/2016.03.09/slides-djb-20160309-a4.pdf 11 comments crypto
- Failures in NIST’s ECC standards https://cr.yp.to/newelliptic/nistecc-20160106.pdf 6 comments crypto
- Calculus for mathematicians (1997) http://cr.yp.to/papers/calculus.pdf 67 comments math
- The death of optimizing compilers http://cr.yp.to/talks/2015.04.16/slides-djb-20150416-a4.pdf 13 comments rust
- The self-pipe trick http://cr.yp.to/docs/selfpipe.html 10 comments programming
- tinydns/djbdns help? http://cr.yp.to/djbdns/run-server.html 6 comments linux
- What's the cryptanalysis status of ChaCha20? http://cr.yp.to/chacha.html 49 comments crypto
- Poly1305-AES: a state-of-the-art message-authentication code http://cr.yp.to/mac.html 18 comments crypto
- New MinimaLT network protocol by Petullo, Zhang, Solworth, DJB, Lange: "Connects faster than TCP, higher security than TLS" [PDF] http://cr.yp.to/tcpip/minimalt-20130522.pdf 16 comments netsec
- DJB - Failures of secret-key cryptography [Slides] [PDF] http://cr.yp.to/talks/2013.03.12/slides.pdf 6 comments netsec
- The security impact of a new cryptographic library - by Dan Bernstein [PDF] http://cr.yp.to/highspeed/coolnacl-20111201.pdf 7 comments netsec
- Who uses djb's global package namespace? Why so few? http://cr.yp.to/slashpackage.html 7 comments linux
- Slides on the impact of the new NaCl crypto library (from DJB and others) [PDF] http://cr.yp.to/talks/2011.09.28/slides.pdf 6 comments crypto
- DJB: IPv6 migration is a pipe dream http://cr.yp.to/djbdns/ipv6mess.html 70 comments programming
- Why haven't cube attacks broken anything? http://cr.yp.to/cubeattacks.html 10 comments math
- qmail is now officially in the public domain http://cr.yp.to/qmail/dist.html 170 comments programming
- From the creator of qmail: "The purpose of this paper is twofold: first, to present every known technique for computing the product of two large integers..." (19pp PDF) http://cr.yp.to/papers/m3.pdf 12 comments programming
- Liked the C quiz? Here's another good one by D.J.Bernstein (PDF) http://cr.yp.to/2004-494/0830-quiz.pdf 10 comments programming
Linking pages
- bithacks.h - bit hacks header file http://www.catonmat.net/blog/bit-hacks-header-file/ 36 comments
- Imperfect Forward Secrecy: The Coming Cryptocalypse http://tonyarcieri.com/imperfect-forward-secrecy-the-coming-cryptocalypse 23 comments
- aaronsw.com but as one markdown file · GitHub https://gist.github.com/chapmanjacobd/9a5d9eae393d059398b6b8b6369c0c71 1 comment
- Bug Bounty 5 years in. In my first few months at Facebook I… | by Collin Greene | Medium https://medium.com/@collingreene/bug-bounty-5-years-in-c95cda604365#.meijrg3k5 0 comments
- npm/CHANGELOG-2.md at e2dd77ce4b6eaa8a3fc06decf36dcc71c7b21218 · npm/npm · GitHub https://github.com/npm/npm/blob/e2dd77ce4b6eaa8a3fc06decf36dcc71c7b21218/changelogs/CHANGELOG-2.md#security-advisory-bearer-token-disclosure 0 comments