www.esat.kuleuven.be February 2019
02/11/2019
hare and tortoise race in post-quantum cryptography: using simd and just-in-time for fast and compact key encapsulation mechanism
proposal: x/crypto: deprecate unused, legacy and problematic packages
github.com February 2019
[Cfrg] Structure in the S-box of the Russian algorithms (RFC 6986, RFC 7801)
mailarchive.ietf.org February 2019
Introduction to Computer Security: Symmetric Key Encryption
computersecurity.paris February 2019
A Pragmatic Introduction to Secure Multi-Party Computation
securecomputation.org February 2019
Introducing Adiantum: Encryption for the Next Billion Users
security.googleblog.com February 2019
Introducing Sonic: A Practical zk-SNARK with a Nearly Trustless Setup
www.benthamsgaze.org February 2019
Go implementation of OPAQUE (hidden password user registration and auth)
github.com February 2019
Quantum computing as a field is obvious bullshit
scottlocklin.wordpress.com February 2019
Australian government clamping down on security research, academic says
www.computerworld.com.au February 2019
Rogaway: Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys (2006)
eprint.iacr.org February 2019
Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process
nvlpubs.nist.gov February 2019
How the L0pht (probably) optimized attack against the LanMan hash.
modexp.wordpress.com February 2019