wire.com February 2019
02/20/2019
Summary of the second Messaging Layer Security (MLS) interim meeting
Attack of the week: searchable encryption and the ever-expanding leakage function
blog.cryptographyengineering.com February 2019
The Next Vulnerability: Looking Back on Meltdown and Spectre One Year Later
www.rambus.com February 2019
hare and tortoise race in post-quantum cryptography: using simd and just-in-time for fast and compact key encapsulation mechanism
www.esat.kuleuven.be February 2019
proposal: x/crypto: deprecate unused, legacy and problematic packages
github.com February 2019
[Cfrg] Structure in the S-box of the Russian algorithms (RFC 6986, RFC 7801)
mailarchive.ietf.org February 2019
Introduction to Computer Security: Symmetric Key Encryption
computersecurity.paris February 2019
A Pragmatic Introduction to Secure Multi-Party Computation
securecomputation.org February 2019
Introducing Adiantum: Encryption for the Next Billion Users
security.googleblog.com February 2019
Introducing Sonic: A Practical zk-SNARK with a Nearly Trustless Setup
www.benthamsgaze.org February 2019