Arthur Besse@lemmy.mlMEnglish · 2 years ago28 years later, ETSI's TETRA committee unanimously votes to open source their secret encryption algorithmsplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link28 years later, ETSI's TETRA committee unanimously votes to open source their secret encryption algorithmsplus-squarewww.theregister.comArthur Besse@lemmy.mlMEnglish · 2 years agomessage-square0linkfedilink
Arthur Besse@lemmy.mlMEnglish · 2 years agoPassive SSH RSA Key Compromise via Latticesplus-squareeprint.iacr.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPassive SSH RSA Key Compromise via Latticesplus-squareeprint.iacr.orgArthur Besse@lemmy.mlMEnglish · 2 years agomessage-square0linkfedilink
Arthur Besse@lemmy.mlMEnglish · 2 years agoNearly-finalized eIDAS legislation requires browsers to trust state-issued CAs, and prohibits using certificate transparency to prevent abuses of them: only ETSI-approved authenticity checks allowed.plus-squarelast-chance-for-eidas.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNearly-finalized eIDAS legislation requires browsers to trust state-issued CAs, and prohibits using certificate transparency to prevent abuses of them: only ETSI-approved authenticity checks allowed.plus-squarelast-chance-for-eidas.orgArthur Besse@lemmy.mlMEnglish · 2 years agomessage-square0linkfedilink
Settoletto 🍤@fed.dyne.org · edit-22 years agoCrypto power to the people! plus-squarefed.dyne.orgimagemessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageCrypto power to the people! plus-squarefed.dyne.orgSettoletto 🍤@fed.dyne.org · edit-22 years agomessage-square0linkfedilink
Arthur Besse@lemmy.mlMEnglish · edit-22 years agoThe inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level.plus-squareblog.cr.yp.toexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level.plus-squareblog.cr.yp.toArthur Besse@lemmy.mlMEnglish · edit-22 years agomessage-square0linkfedilink
Voyager@psychedelia.inkEnglish · edit-23 years agoQuantum Resistance and the Signal Protocolplus-squaresignal.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkQuantum Resistance and the Signal Protocolplus-squaresignal.orgVoyager@psychedelia.inkEnglish · edit-23 years agomessage-square0linkfedilink
overflow@lemmy.ml · 3 years agoHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogoverflow@lemmy.ml · 3 years agomessage-square0linkfedilink
Spzi@lemm.eeEnglish · 3 years agoAES: How to Design Secure Encryption (Spanning Tree)plus-squarepiped.videoexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAES: How to Design Secure Encryption (Spanning Tree)plus-squarepiped.videoSpzi@lemm.eeEnglish · 3 years agomessage-square0linkfedilink
overflow@lemmy.ml · 3 years agoInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogoverflow@lemmy.ml · 3 years agomessage-square0linkfedilink
tedu@azorius.net · 3 years agoThe Cryptographer Who Ensures We Can Trust Our Computersplus-squarewww.quantamagazine.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Cryptographer Who Ensures We Can Trust Our Computersplus-squarewww.quantamagazine.orgtedu@azorius.net · 3 years agomessage-square0linkfedilink
Arthur Besse@lemmy.mlMEnglish · 3 years agoInterview with the ETSI Standards Organization That Created TETRA "Backdoor"plus-squarezetter.substack.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInterview with the ETSI Standards Organization That Created TETRA "Backdoor"plus-squarezetter.substack.comArthur Besse@lemmy.mlMEnglish · 3 years agomessage-square0linkfedilink
Arthur Besse@lemmy.mlM · 3 years agoAll cops are broadcasting: breaking TETRA after decades in the shadowsplus-squarewww.midnightblue.nlexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAll cops are broadcasting: breaking TETRA after decades in the shadowsplus-squarewww.midnightblue.nlArthur Besse@lemmy.mlM · 3 years agomessage-square0linkfedilink
overflow@lemmy.mlEnglish · 3 years ago17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.beoverflow@lemmy.mlEnglish · 3 years agomessage-square0linkfedilink
overflow@lemmy.mlEnglish · 3 years agoPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.beoverflow@lemmy.mlEnglish · 3 years agomessage-square0linkfedilink
overflow@lemmy.mlEnglish · 3 years agoOn Ashton Kutcher and Secure Multi-Party Computationplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOn Ashton Kutcher and Secure Multi-Party Computationplus-squareblog.cryptographyengineering.comoverflow@lemmy.mlEnglish · 3 years agomessage-square0linkfedilink
overflow@lemmy.mlEnglish · 3 years agoBook Review: Red Team Bluesplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBook Review: Red Team Bluesplus-squareblog.cryptographyengineering.comoverflow@lemmy.mlEnglish · 3 years agomessage-square0linkfedilink
Arthur Besse@lemmy.mlMEnglish · 3 years agoan audit of a fintech company's threshold ECDSA implementation yielded four CVEsplus-squareresearch.kudelskisecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkan audit of a fintech company's threshold ECDSA implementation yielded four CVEsplus-squareresearch.kudelskisecurity.comArthur Besse@lemmy.mlMEnglish · 3 years agomessage-square0linkfedilink
overflow@lemmy.mlEnglish · 3 years agoInformation Security—Before & After Public-Key Cryptographyplus-squareinvidious.projectsegfau.ltexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInformation Security—Before & After Public-Key Cryptographyplus-squareinvidious.projectsegfau.ltoverflow@lemmy.mlEnglish · 3 years agomessage-square0linkfedilink
overflow@lemmy.mlEnglish · 3 years agoHow Not to Learn Cryptographyplus-squareesl.cs.brown.eduexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow Not to Learn Cryptographyplus-squareesl.cs.brown.eduoverflow@lemmy.mlEnglish · 3 years agomessage-square0linkfedilink
overflow@lemmy.mlEnglish · 3 years agoTheory and Practice of Cryptographyplus-squarevid.puffyan.usexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTheory and Practice of Cryptographyplus-squarevid.puffyan.usoverflow@lemmy.mlEnglish · 3 years agomessage-square0linkfedilink