bristolcrypto.blogspot.com August 2016
08/16/2016
Crypto 2016: Provable Security for Symmetric Cryptography
Crypto 2016: A subfield lattice attack on overstretched NTRU assumptions
bristolcrypto.blogspot.com August 2016
Difference between lightweight, online and low memory Authenticated Encryption schemes
crypto.stackexchange.com August 2016
Cabinet of curiosities: A bunch of cryptographic protocol oddities
blog.bjrn.se August 2016
High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem
eprint.iacr.org August 2016
WireGuard: Next Generation Kernel Network Tunnel (to replace ipsec/openvpn)
www.wireguard.io July 2016
The Evolution of Signatures in TLS Signature algorithms and schemes in TLS 1.0 - 1.3
timtaubert.de July 2016
How do certification authorities store their private root keys?
security.stackexchange.com July 2016
Amazing slides from dan boneh on RSA's history. Pretty complete
crypto.stanford.edu July 2016