hanno@lemmy.worldEnglish · 2 months agoMixing up Public and Private Keys in OpenID Connect deploymentsplus-squareblog.hboeck.deexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkMixing up Public and Private Keys in OpenID Connect deploymentsplus-squareblog.hboeck.dehanno@lemmy.worldEnglish · 2 months agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 3 months agoAs expensive as a plane flight: Looking at some claims that quantum computers won't work.plus-squareblog.cr.yp.toexternal-linkmessage-square0fedilinkarrow-up15arrow-down12
arrow-up13arrow-down1external-linkAs expensive as a plane flight: Looking at some claims that quantum computers won't work.plus-squareblog.cr.yp.toArthur Besse@lemmy.mlMEnglish · 3 months agomessage-square0fedilink
Jaromil@fed.dyne.org · 4 months agoOn the Proof of Ownership of Digital Walletsplus-squarewww.mdpi.comexternal-linkmessage-square1fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkOn the Proof of Ownership of Digital Walletsplus-squarewww.mdpi.comJaromil@fed.dyne.org · 4 months agomessage-square1fedilink
A1kmm@lemmy.amxl.comEnglish · 4 months agoProject Uniquonym - a concept (not yet implemented) for coupling pseudonymity with limits on sybil attacks / astroturfingplus-squarelemmy.amxl.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkProject Uniquonym - a concept (not yet implemented) for coupling pseudonymity with limits on sybil attacks / astroturfingplus-squarelemmy.amxl.comA1kmm@lemmy.amxl.comEnglish · 4 months agomessage-square0fedilink
OCTADE@soc.octade.net · 4 months agoGOLDILOCKER Brain Wallet - Generate OpenSSL Goldilocks Elliptic Curve Keys from Seed Phraseplus-squaremessage-squaremessage-square0fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1message-squareGOLDILOCKER Brain Wallet - Generate OpenSSL Goldilocks Elliptic Curve Keys from Seed Phraseplus-squareOCTADE@soc.octade.net · 4 months agomessage-square0fedilink
OCTADE@soc.octade.net · edit-24 months agoKSRNG - Key Strike Random Generator (version 0.0.1)plus-squaremessage-squaremessage-square2fedilinkarrow-up12arrow-down11
arrow-up11arrow-down1message-squareKSRNG - Key Strike Random Generator (version 0.0.1)plus-squareOCTADE@soc.octade.net · edit-24 months agomessage-square2fedilink
OCTADE@soc.octade.net · edit-24 months agoMEGARAND Extreme Overkill Random Seed Generatorplus-squaremessage-squaremessage-square2fedilinkarrow-up13arrow-down12
arrow-up11arrow-down1message-squareMEGARAND Extreme Overkill Random Seed Generatorplus-squareOCTADE@soc.octade.net · edit-24 months agomessage-square2fedilink
OCTADE@soc.octade.net · edit-24 months agoCryptologue Arcade - Crypto Darkpaper - Crypto Color Prints - Simplementation Scheme : A Color-Coded Method For Indexing Research and Documentationplus-squaremessage-squaremessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareCryptologue Arcade - Crypto Darkpaper - Crypto Color Prints - Simplementation Scheme : A Color-Coded Method For Indexing Research and Documentationplus-squareOCTADE@soc.octade.net · edit-24 months agomessage-square0fedilink
OCTADE@soc.octade.net · edit-24 months agoHexlish Alphabet for English, Constructed Languages and Cryptography: Automatic, Structural Compression with a Phonetic Hexadecimal Alphabetplus-squaremessage-squaremessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1message-squareHexlish Alphabet for English, Constructed Languages and Cryptography: Automatic, Structural Compression with a Phonetic Hexadecimal Alphabetplus-squareOCTADE@soc.octade.net · edit-24 months agomessage-square0fedilink
Jaromil@fed.dyne.org · 6 months agoLatticeGen: how to hide LLM conversations for Privacy-Aware Cloud AIplus-squarearxiv.orgexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkLatticeGen: how to hide LLM conversations for Privacy-Aware Cloud AIplus-squarearxiv.orgJaromil@fed.dyne.org · 6 months agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 6 months ago"The sins of the 90s": Questioning a puzzling claim by Meredith Whittaker about mass surveillanceplus-squareblog.cr.yp.toexternal-linkmessage-square1fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-link"The sins of the 90s": Questioning a puzzling claim by Meredith Whittaker about mass surveillanceplus-squareblog.cr.yp.toArthur Besse@lemmy.mlMEnglish · 6 months agomessage-square1fedilink
Arthur Besse@lemmy.mlMEnglish · edit-26 months agoNIST Announces 14 Candidates to Advance to the Second Round of the Additional Digital Signatures for the Post-Quantum Cryptography Standardization Processplus-squarecsrc.nist.govexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkNIST Announces 14 Candidates to Advance to the Second Round of the Additional Digital Signatures for the Post-Quantum Cryptography Standardization Processplus-squarecsrc.nist.govArthur Besse@lemmy.mlMEnglish · edit-26 months agomessage-square0fedilink
pancake@lemmygrad.ml · 8 months ago[Idea] FHE-RAM-based message routingplus-squaremessage-squaremessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-square[Idea] FHE-RAM-based message routingplus-squarepancake@lemmygrad.ml · 8 months agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 8 months agoNSA's influence on cryptographic standards (slides from a 2022 talk by D. J. Bernstein)plus-squarecr.yp.toexternal-linkmessage-square3fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkNSA's influence on cryptographic standards (slides from a 2022 talk by D. J. Bernstein)plus-squarecr.yp.toArthur Besse@lemmy.mlMEnglish · 8 months agomessage-square3fedilink
yo_scottie_oh@lemmy.mlEnglish · 8 months agoPublic Key Cryptography - Computerphileplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkPublic Key Cryptography - Computerphileplus-squareyoutu.beyo_scottie_oh@lemmy.mlEnglish · 8 months agomessage-square0fedilink
positive_intentions@lemmy.mlEnglish · 8 months agoEncrypted P2P Chatplus-squarechat.positive-intentions.comexternal-linkmessage-square17fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkEncrypted P2P Chatplus-squarechat.positive-intentions.compositive_intentions@lemmy.mlEnglish · 8 months agomessage-square17fedilink
solrize@lemmy.world · 9 months agoBernstein and Lange -- Safe curves for Elliptic Curve Cryptography [pdf]plus-squareeprint.iacr.orgexternal-linkmessage-square3fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkBernstein and Lange -- Safe curves for Elliptic Curve Cryptography [pdf]plus-squareeprint.iacr.orgsolrize@lemmy.world · 9 months agomessage-square3fedilink
solrize@lemmy.world · 9 months agoThe government unveils its quantum counter-weaponsplus-squarewww.politico.comexternal-linkmessage-square1fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkThe government unveils its quantum counter-weaponsplus-squarewww.politico.comsolrize@lemmy.world · 9 months agomessage-square1fedilink
hanno@lemmy.worldEnglish · 9 months agobadkeys.info - checking cryptographic public keys for known vulnerabilitiesplus-squarebadkeys.infoexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkbadkeys.info - checking cryptographic public keys for known vulnerabilitiesplus-squarebadkeys.infohanno@lemmy.worldEnglish · 9 months agomessage-square0fedilink
Settoletto 🍤@fed.dyne.org · 10 months agoTomb, encrypting your precious data since 2007. Version 2.11 was just released.plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkTomb, encrypting your precious data since 2007. Version 2.11 was just released.plus-squaregithub.comSettoletto 🍤@fed.dyne.org · 10 months agomessage-square0fedilink