mjos.fi October 2017
10/08/2017
How to try to predict the output of Micali-Schnorr Generator (MS-DRBG) knowing the factorization
blog.intothesymmetry.com October 2017
Secure Two-Party Computation with Fairness -- A Necessary Design Principle
eprint.iacr.org October 2017
Gimli: Statement regarding "Cryptanalysis of 22 1/2 rounds of Gimli"
gimli.cr.yp.to September 2017
Improving the sphincs post-quantum signature scheme, part 2
research.kudelskisecurity.com September 2017
Improving the sphincs post-quantum signature scheme, part 1
research.kudelskisecurity.com September 2017
Cloudflare introduces Geo Key Manager, using Identity Based Encryption
blog.cloudflare.com September 2017
Vale: Verifying High-Performance Cryptographic Assembly Code (Usenix17)
www.youtube.com September 2017
Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX (USENIX17)
www.youtube.com September 2017
Finding Bugs in Cryptographic Hash Function Implementations
eprint.iacr.org September 2017