recentpopularlog in

asteroza : cryptography   293

« earlier  
Whose Curve Is It Anyway
Setting the ECC curve basepoint to the real pubkey of a cached real root cert makes for trivial attacks
CVE-2020-0601  curveball  chain-of-fools  security  exploit  windows  10  ECC  elliptic  curve  cryptography 
4 days ago by asteroza
ACRAB (Applied Cryptography Research: A Board)
New place for cryptography academic papers to get aggregated for easier discovery by practitioners/researchers.
cryptography  research  academic  paper  news  aggregator  portal  realworldcrypto  encryption 
15 days ago by asteroza
GRC's | SQRL Secure Quick Reliable Login
So it has some functions like a password manager, but the usability is interesting.
SQRL  login  authentication  cryptography  QRcode  security 
7 weeks ago by asteroza
Loki - Trade and communicate with absolute freedom.
Some sort of hybrid overlay network, taking some of the mixnet properties of Tor, some of the mixnet and UDP protocol underpinnings of I2P, and using a blockchain token system in the mixnet to try to hold down bad actors trying to take majority routing control (a key weakness of Tor) via both proof of work and proof of stake/service (for hidden services called SNapps).
anonymity  privacy  security  mixnet  overlay  network  cryptography  encryption  blockchain  token 
11 weeks ago by asteroza
Microsoft/SymCrypt: Cryptographic library
Wow, core crypto opensourced. They used to keep this locked down in a NOFORN repo...
microsoft  windows  core  symmetric  asymmetric  encryption  cryptography  library  software  opensource 
may 2019 by asteroza
Trapdoor commitments in the SwissPost e-voting shuffle proof
So that SwissPost/Scytl voting system that looked like a hot mess according to various infosec twitter hot takes, turns out to be a hot mess...
information  security  election  voting  ballet  system  cryptography  e-voting  research  switzerland 
march 2019 by asteroza
pocs/ at master · corkami/pocs
Instant (pre-computed prefix), re-usable & generic (any file pair!) MD5 collisions over different file formats. If someone were a real bastard, and got their hands on a naughty file hash database, this can wreak untold havoc
MD5  hash  collision  cryptography 
december 2018 by asteroza
Cryptology ePrint Archive: Report 2018/962 - Zexe: Enabling Decentralized Private Computation
Interesting use of zcash protocol for arbitrary computation purposes. Might enable a distributed exchange
Zcash  protocol  zero  knowledge  proof  algorithm  cryptography  research  computer  science 
october 2018 by asteroza
Cryptology ePrint Archive: Report 2018/183
zero knowledge proof-of-time for cryptocurrencies, by Bram Cohen (for use by Chia?)
cryptography  algorithm  research  zero  knowledge  proof-of-time  cryptocurrency 
august 2018 by asteroza
Home - Chia Network
Bram Cohen is working on a cryptocurrency using proof of space/time
blockchain  proof-of-space  proof-of-time  cryptography  cryptocurrency 
august 2018 by asteroza
saltpack - a modern crypto messaging format
thin wrapper around NaCl library using MessagePack format, as an alternative to PGP
encrypted  messaging  format  saltpack  cryptography  encryption  messagepack  nacl  PGP  GPG 
may 2018 by asteroza
« earlier      
per page:    204080120160

Copy this bookmark:

to read