Hacker News
- Kimchi: The latest update to Mina's zero-knowledge proof system https://cryptologie.net/article/554/kimchi-the-latest-update-to-minas-proof-system/ 9 comments
- How do people find bugs? https://cryptologie.net/article/511/how-do-people-find-bugs/ 7 comments
- The missing explanation of ZK-SNARKs: Part 1 https://www.cryptologie.net/article/507/the-missing-explanation-of-zk-snarks/ 16 comments
- Why I’m Writing a Book on Cryptography https://www.cryptologie.net/article/504/why-im-writing-a-book-on-cryptography/ 32 comments
- Maybe we shouldn't skip SHA-3 https://www.cryptologie.net/article/400/maybe-dont-skip-sha-3/ 110 comments
- Let's Encrypt Overview http://www.cryptologie.net/article/274/lets-encrypt-overview/ 114 comments
- What's the deal with the "zkapps" mentioned by Vitalik? https://www.cryptologie.net/article/575/whats-the-deal-with-zkapps/ 7 comments ethereum
- What's the deal with zkapps? https://www.cryptologie.net/article/575/whats-the-deal-with-zkapps/ 16 comments cryptocurrency
- The code is the specification? Introducing cargo spec https://www.cryptologie.net/article/553/the-code-is-the-specification-introducing-cargo-spec/ 7 comments rust
- Why I’m Writing A Book On Cryptography https://www.cryptologie.net/article/504/ 9 comments netsec
- Why I’m Writing A Book On Cryptography https://www.cryptologie.net/article/504/why-im-writing-a-book-on-cryptography/ 6 comments netsec
- Why I’m Writing A Book On Cryptography https://www.cryptologie.net/article/504/why-im-writing-a-book-on-cryptography/ 8 comments crypto
- User Authentication with Passwords, What's SRP? https://www.cryptologie.net/article/503/user-authentication-with-passwords-whats-srp/ 64 comments crypto
- Alternatives to PGP https://www.cryptologie.net/article/502/alternatives-to-pgp/ 47 comments crypto
- Hardware Solutions To Highly-Adversarial Environments Part 3: Trusted Execution Environment (TEE), SGX, TrustZone and Hardware Security Tokens https://www.cryptologie.net/article/501/hardware-solutions-to-highly-adversarial-environments-part-3-trusted-execution-environment-tee-sgx-trustzone-and-hardware-security-tokens/ 4 comments crypto
- Hardware Solutions To Highly-Adversarial Environments Part 2: HSM vs TPM vs Secure Enclave https://cryptologie.net/article/500/hardware-solutions-to-highly-adversarial-environments-part-2-hsm-vs-tpm-vs-secure-enclave/ 9 comments crypto
- EdDSA, Ed25519, Ed25519-IETF, Ed25519ph, Ed25519ctx, HashEdDSA, PureEdDSA, WTF? https://www.cryptologie.net/article/497/eddsa-ed25519-ed25519-ietf-ed25519ph-ed25519ctx-hasheddsa-pureeddsa-wtf/ 6 comments crypto
- What's a key exchange? https://www.cryptologie.net/article/496/whats-a-key-exchange/ 9 comments crypto
- Cryptographic Signatures, Surprising Pitfalls, and LetsEncrypt https://www.cryptologie.net/article/495/cryptographic-signatures-surprising-pitfalls-and-letsencrypt/ 3 comments crypto
- How symmetric password-authenticated key exchanges work (sPAKE) https://www.cryptologie.net/article/490/how-symmetric-password-authenticated-key-exchanges-work-spake/ 14 comments crypto
- Authentication, What The Fuck? https://www.cryptologie.net/article/489/authentication-what-the-fuck/ 5 comments crypto
- What is the BLS signature scheme? https://cryptologie.net/article/472/what-is-the-bls-signature-scheme/ 5 comments crypto
- On Doing Research https://www.cryptologie.net/article/469/on-doing-research/ 5 comments netsec
- [comic] Proof of Elgamal's semantic security using a reduction to DDH https://cryptologie.net/article/464/proof-of-elgamals-semantic-security-using-a-reduction-to-ddh/ 7 comments crypto
- Writing a DAPP for the Ethereum block chain https://www.cryptologie.net/article/424/writing-a-dapp-for-the-ethereum-block-chain/ 3 comments ethereum
- Attacks on Smart contracts https://www.cryptologie.net/article/423/attacks-on-ethereum-smart-contracts/ 5 comments netsec
- Attacks on smart contracts https://www.cryptologie.net/article/423/attacks-on-ethereum-smart-contracts/ 3 comments ethereum
- How did length extension attacks made it into SHA-2? https://www.cryptologie.net/article/417/how-did-length-extension-attacks-made-it-into-sha-2/ 11 comments crypto
- The Strobe Protocol Framework: an Introduction https://www.cryptologie.net/article/416/the-strobe-protocol-framework/ 5 comments crypto
- Maybe don't skip SHA-3 https://cryptologie.net/article/400/maybe-you-shouldnt-skip-sha-3/ 49 comments crypto
- Why you should not use SHA-3 and use KangarooTwelve instead https://cryptologie.net/article/393/kangarootwelve/ 22 comments crypto
- TLS 1.3 - Draft 19 https://www.cryptologie.net/article/384/tls-13-draft-19/ 7 comments crypto
- tl;dr of the sweet 32 paper: On the Practical (In-)Security of 64-bit Block Ciphers http://cryptologie.net/article/373/tldr-of-the-sweet-32-paper-on-the-practical-in-security-of-64-bit-block-ciphers/ 5 comments crypto
- 64-bit ciphers attack in 75 hours => AES-GCM attack in 75 hours? https://www.cryptologie.net/article/370/64-bit-ciphers-attack-in-75-hours-aes-gcm-attack-in-75-hours/ 31 comments crypto
- Breaking https' AES-GCM https://www.cryptologie.net/article/361/nonce-disrespecting-adversaries-practical-forgery-attacks-on-gcm-in-tls/ 30 comments netsec
- DROWN short summary https://www.cryptologie.net/article/338/drown-attack-on-openssl/ 3 comments crypto
- NIST and Quantum Computers https://www.cryptologie.net/ 9 comments crypto
- One-time signature schemes http://cryptologie.net/article/306/one-time-signatures/ 4 comments crypto
- Let's Encrypt Overview http://www.cryptologie.net/article/274/lets-encrypt-overview/ 6 comments webdev
- Let's Encrypt Overview (Contains TL;DR/ELI5) http://www.cryptologie.net/article/274/lets-encrypt-overview/ 12 comments netsec
- Implementations of attacks on RSA using LLL reduction of lattices http://cryptologie.net/article/241/implementation-of-boneh-and-durfee-attack-on-rsas-low-private-exponents/ 5 comments crypto