Hacker News new | past | comments | ask | show | jobs | submit | from login
What is the use of Mersenne Primes in cryptography? (crypto.stackexchange.com)
1 point by nomilk 16 days ago | past
Could celestial objects be used in cryptography? (crypto.stackexchange.com)
2 points by wslh 5 months ago | past
ELI5 Post Quantum Kyber Encryption Algorithm (crypto.stackexchange.com)
3 points by ggasp 8 months ago | past
Are RSA signatures distinguishable from random data? (crypto.stackexchange.com)
1 point by susam 10 months ago | past
Are curve secp256k1 ECDSA signatures distinguishable from random data? (crypto.stackexchange.com)
2 points by tosh 11 months ago | past
Can you use memory errors as a source of randomness for cryptography? (crypto.stackexchange.com)
1 point by notpushkin on Sept 4, 2023 | past
Largest integer factored by Shor's algorithm? (crypto.stackexchange.com)
2 points by qsantos on July 11, 2023 | past
Can an AI generate random numbers? (crypto.stackexchange.com)
4 points by Alupis on April 25, 2023 | past | 1 comment
Is there a feasible preimage attack for any hash function today? (crypto.stackexchange.com)
2 points by tgamblin on April 5, 2023 | past | 2 comments
Why does my SSH private key still work after changing some bytes? (2016) (crypto.stackexchange.com)
551 points by curling_grad on Dec 31, 2022 | past | 84 comments
Is AES-128 quantum safe? (crypto.stackexchange.com)
4 points by samuel246 on Dec 8, 2022 | past
Why does GMP only run Miller-Rabin test twice when generating a prime? (crypto.stackexchange.com)
1 point by irjustin on Dec 3, 2022 | past
MD5: Existence of Invariant (Fixed Point) (crypto.stackexchange.com)
2 points by susam on Nov 13, 2022 | past
Why use non-extractable keys? (crypto.stackexchange.com)
2 points by EGreg on Nov 11, 2022 | past
Why do web APIs tend to use pre-shared keys for client auth instead of pubkeys? (crypto.stackexchange.com)
2 points by zhxshen on Sept 13, 2022 | past | 1 comment
Why do web-services tend to use preshared secret keys for client authentication (crypto.stackexchange.com)
1 point by todsacerdoti on Sept 12, 2022 | past
How easy is it in 2022 to find a SHA1 collision? (crypto.stackexchange.com)
339 points by gary_0 on April 24, 2022 | past | 165 comments
Tuples secure multi-party computation against malicious adversaries algorithms (crypto.stackexchange.com)
2 points by wslh on March 19, 2022 | past
Apple's New CSAM Protections May Make iCloud Photos Bruteforceable (crypto.stackexchange.com)
233 points by NTroy on Aug 8, 2021 | past | 81 comments
Is using the same IV the same as not using an IV at all? (crypto.stackexchange.com)
6 points by likecarter on June 9, 2021 | past | 1 comment
Are hash functions strong against quantum cryptanalysis? (crypto.stackexchange.com)
2 points by doener on March 8, 2021 | past
Crypto.se is debunking Terra Quantum AG claim to have broken AES as a scam (crypto.stackexchange.com)
1 point by anomalroil on Feb 10, 2021 | past
Why is HMAC-SHA1 still considered secure? (2015) (crypto.stackexchange.com)
2 points by chanind on Dec 31, 2020 | past
ASK HN: Are there cryptographical flaws in this e2ee website chat widget? (crypto.stackexchange.com)
1 point by AdriaanvRossum on April 19, 2020 | past | 1 comment
Is 128-bit security still considered strong in 2020 (crypto.stackexchange.com)
1 point by azhenley on Jan 24, 2020 | past
Is 128-bit security still considered strong in 2020? (crypto.stackexchange.com)
2 points by anomalroil on Jan 14, 2020 | past
Public key – Who verifies the trust of certificate authorities? (crypto.stackexchange.com)
4 points by vinnyglennon on Dec 27, 2019 | past
Can you create a time capsule using cryptography? (crypto.stackexchange.com)
1 point by bikeshaving on July 8, 2019 | past | 1 comment
Is Convergent Encryption Secure? (crypto.stackexchange.com)
2 points by anaphor on June 14, 2019 | past
What are the implications of the new alleged key recovery attack on SIMON? (crypto.stackexchange.com)
1 point by hsnewman on May 14, 2019 | past

Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: