research.kudelskisecurity.com April 2019
04/16/2019 04/14/2019
Understanding Zero-knowledge proofs through illustrated examples
blog.goodaudience.com April 2019
What is the difference between signatures and VRF? Ask Question
crypto.stackexchange.com April 2019
Dragonblood: A Security Analysis of WPA3’s SAE Handshake
papers.mathyvanhoef.com April 2019
What you see is not what you get: when homographs attack
wildfire.blazeinfosec.com April 2019
Performing Concolic Execution on Cryptographic Primitives
blog.trailofbits.com April 2019
EverCrypt cryptographic provider offers developers greater security assurances
www.microsoft.com April 2019
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency
eprint.iacr.org April 2019