Jaromil@fed.dyne.org · 1 year agoLatticeGen: how to hide LLM conversations for Privacy-Aware Cloud AIplus-squarearxiv.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkLatticeGen: how to hide LLM conversations for Privacy-Aware Cloud AIplus-squarearxiv.orgJaromil@fed.dyne.org · 1 year agomessage-square0linkfedilink
Arthur Besse@lemmy.mlMEnglish · 1 year ago"The sins of the 90s": Questioning a puzzling claim by Meredith Whittaker about mass surveillanceplus-squareblog.cr.yp.toexternal-linkmessage-square1linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-link"The sins of the 90s": Questioning a puzzling claim by Meredith Whittaker about mass surveillanceplus-squareblog.cr.yp.toArthur Besse@lemmy.mlMEnglish · 1 year agomessage-square1linkfedilink
Arthur Besse@lemmy.mlMEnglish · 1 year agoNIST Announces 14 Candidates to Advance to the Second Round of the Additional Digital Signatures for the Post-Quantum Cryptography Standardization Processplus-squarecsrc.nist.govexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkNIST Announces 14 Candidates to Advance to the Second Round of the Additional Digital Signatures for the Post-Quantum Cryptography Standardization Processplus-squarecsrc.nist.govArthur Besse@lemmy.mlMEnglish · 1 year agomessage-square0linkfedilink
Arthur Besse@lemmy.mlMEnglish · 1 year agoNSA's influence on cryptographic standards (slides from a 2022 talk by D. J. Bernstein)plus-squarecr.yp.toexternal-linkmessage-square3linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkNSA's influence on cryptographic standards (slides from a 2022 talk by D. J. Bernstein)plus-squarecr.yp.toArthur Besse@lemmy.mlMEnglish · 1 year agomessage-square3linkfedilink
yo_scottie_oh@lemmy.mlEnglish · 1 year agoPublic Key Cryptography - Computerphileplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkPublic Key Cryptography - Computerphileplus-squareyoutu.beyo_scottie_oh@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
positive_intentions@lemmy.mlEnglish · 1 year agoEncrypted P2P Chatplus-squarechat.positive-intentions.comexternal-linkmessage-square17linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkEncrypted P2P Chatplus-squarechat.positive-intentions.compositive_intentions@lemmy.mlEnglish · 1 year agomessage-square17linkfedilink
solrize@lemmy.world · 1 year agoBernstein and Lange -- Safe curves for Elliptic Curve Cryptography [pdf]plus-squareeprint.iacr.orgexternal-linkmessage-square3linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkBernstein and Lange -- Safe curves for Elliptic Curve Cryptography [pdf]plus-squareeprint.iacr.orgsolrize@lemmy.world · 1 year agomessage-square3linkfedilink
solrize@lemmy.world · 1 year agoThe government unveils its quantum counter-weaponsplus-squarewww.politico.comexternal-linkmessage-square1linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkThe government unveils its quantum counter-weaponsplus-squarewww.politico.comsolrize@lemmy.world · 1 year agomessage-square1linkfedilink
hanno@lemmy.worldEnglish · 2 years agobadkeys.info - checking cryptographic public keys for known vulnerabilitiesplus-squarebadkeys.infoexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkbadkeys.info - checking cryptographic public keys for known vulnerabilitiesplus-squarebadkeys.infohanno@lemmy.worldEnglish · 2 years agomessage-square0linkfedilink
Settoletto 🍤@fed.dyne.org · 2 years agoTomb, encrypting your precious data since 2007. Version 2.11 was just released.plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkTomb, encrypting your precious data since 2007. Version 2.11 was just released.plus-squaregithub.comSettoletto 🍤@fed.dyne.org · 2 years agomessage-square0linkfedilink
Arthur Besse@lemmy.mlMEnglish · 2 years agoMultiple nations enact mysterious export controls on quantum computersplus-squarewww.newscientist.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkMultiple nations enact mysterious export controls on quantum computersplus-squarewww.newscientist.comArthur Besse@lemmy.mlMEnglish · 2 years agomessage-square0linkfedilink
positive_intentions@lemmy.mlEnglish · 2 years agoJavascript cryptography in the wildplus-squaregithub.comexternal-linkmessage-square1linkfedilinkarrow-up19arrow-down12
arrow-up17arrow-down1external-linkJavascript cryptography in the wildplus-squaregithub.compositive_intentions@lemmy.mlEnglish · 2 years agomessage-square1linkfedilink
I_like_cats@lemmy.one · 2 years agoHow to implement a secure Microsoft Recall alternative?plus-squaremessage-squaremessage-square12linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareHow to implement a secure Microsoft Recall alternative?plus-squareI_like_cats@lemmy.one · 2 years agomessage-square12linkfedilink
Arthur Besse@lemmy.mlMEnglish · 2 years agoRandomness on Apple Platforms: "I’m sure the people working on this know what they’re doing, so it’s probably all very reasonable"plus-squareblog.xoria.orgexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkRandomness on Apple Platforms: "I’m sure the people working on this know what they’re doing, so it’s probably all very reasonable"plus-squareblog.xoria.orgArthur Besse@lemmy.mlMEnglish · 2 years agomessage-square0linkfedilink
overflow@lemmy.ml · 2 years agoKeeping Secretsstanfordmag.orgexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkKeeping Secretsstanfordmag.orgoverflow@lemmy.ml · 2 years agomessage-square0linkfedilink
overflow@lemmy.ml · 2 years agoA quick post on Chen’s algorithmplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkA quick post on Chen’s algorithmplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml · 2 years agomessage-square0linkfedilink
Arthur Besse@lemmy.mlMEnglish · 2 years agoPutty vulnerability: bias in ECDSA deterministic nonce generation leads to compromise of NIST P521 keys with ~60 signaturesplus-squarewww.chiark.greenend.org.ukexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkPutty vulnerability: bias in ECDSA deterministic nonce generation leads to compromise of NIST P521 keys with ~60 signaturesplus-squarewww.chiark.greenend.org.ukArthur Besse@lemmy.mlMEnglish · 2 years agomessage-square0linkfedilink
firefly@neon.nightbulb.net · edit-22 years agoHatching Secret Sauce Eggs is a Rooster's Businessplus-squareneon.nightbulb.netimagemessage-square0linkfedilinkarrow-up11arrow-down11
arrow-up10arrow-down1imageHatching Secret Sauce Eggs is a Rooster's Businessplus-squareneon.nightbulb.netfirefly@neon.nightbulb.net · edit-22 years agomessage-square0linkfedilink
overflow@lemmy.ml · 2 years agoWeb-based cryptography is always snake oilplus-squarewww.devever.netexternal-linkmessage-square4linkfedilinkarrow-up117arrow-down16
arrow-up111arrow-down1external-linkWeb-based cryptography is always snake oilplus-squarewww.devever.netoverflow@lemmy.ml · 2 years agomessage-square4linkfedilink
Arthur Besse@lemmy.mlMEnglish · edit-22 years agoSimpleX: adding quantum resistance to Signal double ratchet algorithm (with Streamlined NTRU Prime)plus-squaresimplex.chatexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkSimpleX: adding quantum resistance to Signal double ratchet algorithm (with Streamlined NTRU Prime)plus-squaresimplex.chatArthur Besse@lemmy.mlMEnglish · edit-22 years agomessage-square0linkfedilink