blog.cr.yp.to May 2015
DJB: How to design an elliptic-curve signature system
If you hashed a hash an infinite number of times would you end up with a unique hash?
crypto.stackexchange.com May 2015
Adios, Hola! Or: Why You Should Immediately Uninstall Hola
adios-hola.org May 2015
Transmissions of data through time based covert channels across a network
www.anfractuosity.com May 2015
Daniel J. Bernstein: "How to manipulate standards"
projectbullrun.org May 2015
Top Academic Security & Crypto Papers from 2008 through 2013
saweis.net May 2015
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
www.di.ens.fr May 2015