Arthur Besse@lemmy.mlMEnglish · 14 days agoRandomness on Apple Platforms: "I’m sure the people working on this know what they’re doing, so it’s probably all very reasonable"plus-squareblog.xoria.orgmessage-square0fedilinkarrow-up17
arrow-up17external-linkRandomness on Apple Platforms: "I’m sure the people working on this know what they’re doing, so it’s probably all very reasonable"plus-squareblog.xoria.orgArthur Besse@lemmy.mlMEnglish · 14 days agomessage-square0fedilink
overflow@lemmy.ml · 20 days agoKeeping Secretsplus-squarestanfordmag.orgexternal-linkmessage-square0fedilinkarrow-up17
arrow-up17external-linkKeeping Secretsplus-squarestanfordmag.orgoverflow@lemmy.ml · 20 days agomessage-square0fedilink
overflow@lemmy.ml · 1 month agoA quick post on Chen’s algorithmplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up18
arrow-up18external-linkA quick post on Chen’s algorithmplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml · 1 month agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 1 month agoPutty vulnerability: bias in ECDSA deterministic nonce generation leads to compromise of NIST P521 keys with ~60 signaturesplus-squarewww.chiark.greenend.org.ukmessage-square0fedilinkarrow-up114
arrow-up114external-linkPutty vulnerability: bias in ECDSA deterministic nonce generation leads to compromise of NIST P521 keys with ~60 signaturesplus-squarewww.chiark.greenend.org.ukArthur Besse@lemmy.mlMEnglish · 1 month agomessage-square0fedilink
firefly@neon.nightbulb.net · edit-21 month agoHatching Secret Sauce Eggs is a Rooster's Businessplus-squareneon.nightbulb.netimagemessage-square0fedilinkarrow-up11
arrow-up11imageHatching Secret Sauce Eggs is a Rooster's Businessplus-squareneon.nightbulb.netfirefly@neon.nightbulb.net · edit-21 month agomessage-square0fedilink
overflow@lemmy.ml · 1 month agoWeb-based cryptography is always snake oilwww.devever.netmessage-square4fedilinkarrow-up117
arrow-up117external-linkWeb-based cryptography is always snake oilwww.devever.netoverflow@lemmy.ml · 1 month agomessage-square4fedilink
Arthur Besse@lemmy.mlMEnglish · edit-22 months agoSimpleX: adding quantum resistance to Signal double ratchet algorithm (with Streamlined NTRU Prime)plus-squaresimplex.chatexternal-linkmessage-square0fedilinkarrow-up14
arrow-up14external-linkSimpleX: adding quantum resistance to Signal double ratchet algorithm (with Streamlined NTRU Prime)plus-squaresimplex.chatArthur Besse@lemmy.mlMEnglish · edit-22 months agomessage-square0fedilink
overflow@lemmy.ml · 3 months agoSecurity Cryptography Whatever - Post-Quantum iMessage with Douglas Stebilaplus-squarepodcasts.google.comexternal-linkmessage-square0fedilinkarrow-up16
arrow-up16external-linkSecurity Cryptography Whatever - Post-Quantum iMessage with Douglas Stebilaplus-squarepodcasts.google.comoverflow@lemmy.ml · 3 months agomessage-square0fedilink
overflow@lemmy.ml · 3 months agoDice Random Numbers – Simon Josefsson's blogplus-squareblog.josefsson.orgmessage-square0fedilinkarrow-up15
arrow-up15external-linkDice Random Numbers – Simon Josefsson's blogplus-squareblog.josefsson.orgoverflow@lemmy.ml · 3 months agomessage-square0fedilink
overflow@lemmy.ml · 3 months agoThe Fi Virtual Carrier Networkwww.gstatic.commessage-square1fedilinkarrow-up15
arrow-up15external-linkThe Fi Virtual Carrier Networkwww.gstatic.comoverflow@lemmy.ml · 3 months agomessage-square1fedilink
Arthur Besse@lemmy.mlMEnglish · 3 months agoBackdoors that let cops decrypt messages violate human rights, EU court saysplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up140
arrow-up140external-linkBackdoors that let cops decrypt messages violate human rights, EU court saysplus-squarearstechnica.comArthur Besse@lemmy.mlMEnglish · 3 months agomessage-square0fedilink
overflow@lemmy.ml · 4 months agoAttack of the week: Airdrop tracingplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up15
arrow-up15external-linkAttack of the week: Airdrop tracingplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml · 4 months agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 4 months agoKyberSlash: timing vulnerabilities allow recovering private keys in most Kyber implementations. patches availablekyberslash.cr.yp.tomessage-square0fedilinkarrow-up19
arrow-up19external-linkKyberSlash: timing vulnerabilities allow recovering private keys in most Kyber implementations. patches availablekyberslash.cr.yp.toArthur Besse@lemmy.mlMEnglish · 4 months agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 6 months ago28 years later, ETSI's TETRA committee unanimously votes to open source their secret encryption algorithmsplus-squarewww.theregister.comexternal-linkmessage-square2fedilinkarrow-up17
arrow-up17external-link28 years later, ETSI's TETRA committee unanimously votes to open source their secret encryption algorithmsplus-squarewww.theregister.comArthur Besse@lemmy.mlMEnglish · 6 months agomessage-square2fedilink
Arthur Besse@lemmy.mlMEnglish · 7 months agoPassive SSH RSA Key Compromise via Latticesplus-squareeprint.iacr.orgexternal-linkmessage-square1fedilinkarrow-up15
arrow-up15external-linkPassive SSH RSA Key Compromise via Latticesplus-squareeprint.iacr.orgArthur Besse@lemmy.mlMEnglish · 7 months agomessage-square1fedilink
Arthur Besse@lemmy.mlMEnglish · 7 months agoNearly-finalized eIDAS legislation requires browsers to trust state-issued CAs, and prohibits using certificate transparency to prevent abuses of them: only ETSI-approved authenticity checks allowed.plus-squarelast-chance-for-eidas.orgmessage-square1fedilinkarrow-up122
arrow-up122external-linkNearly-finalized eIDAS legislation requires browsers to trust state-issued CAs, and prohibits using certificate transparency to prevent abuses of them: only ETSI-approved authenticity checks allowed.plus-squarelast-chance-for-eidas.orgArthur Besse@lemmy.mlMEnglish · 7 months agomessage-square1fedilink
Settolino 𓁣@fed.dyne.org · edit-27 months agoCrypto power to the people! plus-squarefed.dyne.orgimagemessage-square1fedilinkarrow-up17
arrow-up17imageCrypto power to the people! plus-squarefed.dyne.orgSettolino 𓁣@fed.dyne.org · edit-27 months agomessage-square1fedilink
Arthur Besse@lemmy.mlMEnglish · edit-27 months agoThe inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level.plus-squareblog.cr.yp.tomessage-square0fedilinkarrow-up12
arrow-up12external-linkThe inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level.plus-squareblog.cr.yp.toArthur Besse@lemmy.mlMEnglish · edit-27 months agomessage-square0fedilink
Voyager@psychedelia.inkEnglish · edit-28 months agoQuantum Resistance and the Signal Protocolplus-squaresignal.orgexternal-linkmessage-square6fedilinkarrow-up125
arrow-up125external-linkQuantum Resistance and the Signal Protocolplus-squaresignal.orgVoyager@psychedelia.inkEnglish · edit-28 months agomessage-square6fedilink
overflow@lemmy.ml · 9 months agoHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up17
arrow-up17external-linkHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogoverflow@lemmy.ml · 9 months agomessage-square0fedilink