Hacker News
- Passkeys – Under the Hood https://research.kudelskisecurity.com/2024/03/14/passkeys-under-the-hood/ 103 comments
- Polynonce: A Tale of a Novel Ecdsa Attack and Bitcoin Tears https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/ 4 comments
- Shufflecake: Plausible Deniability for Multiple Hidden Filesystems https://research.kudelskisecurity.com/2022/11/10/introducing-shufflecake-plausible-deniability-for-multiple-hidden-filesystems-on-linux/ 3 comments
- The definitive guide to “modulo bias” and how to avoid it (2020) https://research.kudelskisecurity.com/2020/07/28/the-definitive-guide-to-modulo-bias-and-how-to-avoid-it/ 44 comments
- Practical bruteforce of AES-1024 military grade encryption https://research.kudelskisecurity.com/2022/05/11/practical-bruteforce-of-aes-1024-military-grade-encryption/ 12 comments
- How to Defeat Ed25519 and EdDSA Using Faults [2017] https://research.kudelskisecurity.com/2017/10/04/defeating-eddsa-with-faults/ 2 comments
- Auditing Rust Crypto: The First Hours https://research.kudelskisecurity.com/2019/02/07/auditing-rust-crypto-the-first-hours/ 86 comments
- Open-source crypto is no better than closed-source crypto https://research.kudelskisecurity.com/2018/10/02/open-source-crypto-is-no-better-than-closed-source-crypto/ 58 comments
- How to defeat Ed25519 and EdDSA using faults https://research.kudelskisecurity.com/2017/10/04/defeating-eddsa-with-faults/ 61 comments
- Should Curve25519 keys be validated? https://research.kudelskisecurity.com/2017/04/25/should-ecdh-keys-be-validated/ 4 comments
- Defeating Quantum Algorithms with Hash Functions https://research.kudelskisecurity.com/2017/02/01/defeating-quantum-algorithms-with-hash-functions/ 19 comments
Lobsters
- Polynonce: A Tale of a Novel ECDSA Attack and Bitcoin Tears https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/ 6 comments cryptography
- Passkeys – Under The Hood https://research.kudelskisecurity.com/2024/03/14/passkeys-under-the-hood/ 5 comments programming
- Polynonce: A Tale of a Novel ECDSA Attack and Bitcoin Tears https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/ 7 comments bitcoin
- Polynonce: A Tale of a Novel ECDSA Attack and Bitcoin Tears https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/ 7 comments ethereum
- Polynonce - A Novel Attack against ECDSA https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/ 3 comments crypto
- Polynonce A Novel Attack against ECDSA. Paper, Code, and associated Story https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/ 15 comments netsec
- Quantum attack resource estimate: using Shor’s algorithm to break RSA vs DH/DSA vs ECC https://research.kudelskisecurity.com/2021/08/24/quantum-attack-resource-estimate-using-shors-algorithm-to-break-rsa-vs-dh-dsa-vs-ecc/ 5 comments crypto
- Introducing Shufflecake: plausible deniability for multiple hidden filesystems on Linux https://research.kudelskisecurity.com/2022/11/10/introducing-shufflecake-plausible-deniability-for-multiple-hidden-filesystems-on-linux/ 23 comments netsec
- Practical bruteforce of "AES-1024" military grade encryption https://research.kudelskisecurity.com/2022/05/11/practical-bruteforce-of-aes-1024-military-grade-encryption/ 15 comments crypto
- EdDSA signature scheme is vulnerable to single fault attacks https://research.kudelskisecurity.com/2017/10/04/defeating-eddsa-with-faults/ 37 comments crypto
- Oramfs: Resizable ORAM, Remote Storage Agnostic, Written in Rust https://research.kudelskisecurity.com/2021/06/30/oramfs-resizable-oram-remote-storage-agnostic-written-in-rust/ 4 comments rust
- The definitive guide to “Modulo Bias and how to avoid it”! https://research.kudelskisecurity.com/2020/07/28/the-definitive-guide-to-modulo-bias-and-how-to-avoid-it/ 19 comments crypto
- J.-P. Aumasson: Should Curve25519 keys be validated? (2017) https://research.kudelskisecurity.com/2017/04/25/should-ecdh-keys-be-validated/ 5 comments crypto
- The definitive guide to “Modulo Bias and how to avoid it”! https://research.kudelskisecurity.com/2020/07/28/the-definitive-guide-to-modulo-bias-and-how-to-avoid-it/ 6 comments crypto
- The definitive guide to “Modulo Bias and how to avoid it”! https://research.kudelskisecurity.com/2020/07/28/the-definitive-guide-to-modulo-bias-and-how-to-avoid-it/ 13 comments netsec
- CVE-2020-0601: the ChainOfFools attack explained with PoC and a test website. https://research.kudelskisecurity.com/2020/01/15/cve-2020-0601-the-chainoffools-attack-explained-with-poc/ 7 comments netsec
- Forget Homomorphic Encryption, here comes Functional Encryption https://research.kudelskisecurity.com/2019/11/25/forget-homomorphic-encryption-here-comes-functional-encryption/ 12 comments netsec
- Forget Homomorphic Encryption, here comes Functional Encryption https://research.kudelskisecurity.com/2019/11/25/forget-homomorphic-encryption-here-comes-functional-encryption/ 3 comments crypto
- FIDO2: Solving the Password Problem https://research.kudelskisecurity.com/2019/10/08/fido2-solving-the-password-problem/ 4 comments netsec
- Quantum Cryptography (not QKD but the "real" stuff) Explained https://research.kudelskisecurity.com/2019/04/02/cryptography-on-a-quantum-computer/ 24 comments crypto
- Kudelski Security Audit of CashShuffle https://research.kudelskisecurity.com/2019/03/27/audit-of-cashshuffle/ 3 comments btc
- Auditing Rust Crypto: The First Hours https://research.kudelskisecurity.com/2019/02/07/auditing-rust-crypto-the-first-hours/ 10 comments rust
- How to defeat Ed25519 and EdDSA using faults https://research.kudelskisecurity.com/2017/10/04/defeating-eddsa-with-faults/ 21 comments crypto
- Should Curve25519 keys be validated? https://research.kudelskisecurity.com/2017/04/25/should-ecdh-keys-be-validated/ 19 comments crypto
- Daily advice thread. All questions about your personal situation should be asked here https://research.kudelskisecurity.com/2017/02/09/wire-cryptography-audit-with-x41-d-sec/ 85 comments privacy
- The Quantum Computer FAQ https://research.kudelskisecurity.com/2017/02/06/the-quantum-computer-faq/ 13 comments compsci
- Breaking any crypto scheme with "anthropic computing" (+quantum and post-quantum stuff) https://research.kudelskisecurity.com/2017/02/01/defeating-quantum-algorithms-with-hash-functions/ 3 comments crypto
- Defeating Quantum Algorithms with Hash Functions https://research.kudelskisecurity.com/2017/02/01/defeating-quantum-algorithms-with-hash-functions/ 34 comments netsec