| | Dead-listing while on vacation (2008) (root.org) |
|
1 point by cpach on Aug 23, 2022 | past
|
| | Stuxnet is embarrassing, not amazing (2011) (root.org) |
|
117 points by rdpintqogeogsaa on June 12, 2022 | past | 91 comments
|
| | Internet Protocol Design (root.org) |
|
1 point by autoditype on Jan 17, 2021 | past
|
| | Software protection: Protecting the protection code (root.org) |
|
1 point by beefhash on June 28, 2020 | past
|
| | Stuxnet was embarrassing, not amazing (2011) (root.org) |
|
121 points by MrXOR on Nov 3, 2019 | past | 82 comments
|
| | Recovering a private key with only a fraction of the bits – rdist (root.org) |
|
1 point by aburan28 on Dec 7, 2017 | past
|
| | Final Post on JavaScript Crypto (root.org) |
|
2 points by rfreytag on March 10, 2015 | past
|
| | Timing-safe memcmp and API parity (root.org) |
|
6 points by wglb on June 25, 2014 | past
|
| | In Defense of JavaScript Crypto (root.org) |
|
5 points by sweis on June 23, 2014 | past
|
| | Final post on JavaScript crypto (root.org) |
|
1 point by wglb on June 17, 2014 | past
|
| | Digging into the NSA revelations (root.org) |
|
3 points by steveklabnik on Jan 12, 2014 | past
|
| | RSA public keys are not private (implementation) (root.org) |
|
1 point by ColinWright on April 25, 2013 | past
|
| | Has HTML5 made us more secure? (root.org) |
|
2 points by B-Con on Dec 4, 2012 | past
|
| | Cyber Weapon Authors Catch Up On Blog Reading (root.org) |
|
4 points by tptacek on Aug 14, 2012 | past
|
| | RSA repeats earlier claims, but louder (root.org) |
|
2 points by wglb on June 29, 2012 | past
|
| | Why RSA is misleading about SecurID vulnerability (root.org) |
|
3 points by wglb on June 28, 2012 | past
|
| | Why stream ciphers shouldn’t be used for hashing (root.org) |
|
1 point by wglb on Jan 31, 2012 | past
|
| | More on the evolution of password security (root.org) |
|
2 points by wglb on Jan 19, 2012 | past
|
| | On the evolving security of password schemes (root.org) |
|
2 points by KateLawson on Jan 10, 2012 | past | 1 comment
|
| | Mixed voltage interfacing for design or hacking (root.org) |
|
1 point by wglb on Jan 6, 2012 | past
|
| | Internet Protocol Design and Implementation (root.org) |
|
1 point by powertower on Dec 30, 2011 | past
|
| | The lost Van Jacobson paper that could save the Internet (root.org) |
|
280 points by wglb on Dec 30, 2011 | past | 48 comments
|
| | Stop using unsafe keyed hashes, use HMAC (root.org) |
|
1 point by fosk on Dec 12, 2011 | past
|
| | Recovering a private key with only a fraction of the bits (root.org) |
|
4 points by wglb on Sept 23, 2011 | past
|
| | The HDCP magic inside Bunnie's NeTV (root.org) |
|
15 points by fanf2 on Sept 14, 2011 | past | 1 comment
|
| | Old programming habits die hard (root.org) |
|
3 points by l0stman on Sept 3, 2011 | past
|
| | Quantum cryptography is useless (root.org) |
|
2 points by karlzt on Aug 16, 2011 | past
|
| | Intermediate cryptography resources (root.org) |
|
8 points by there on June 28, 2011 | past
|
| | State space explosion in program analysis and crypto (root.org) |
|
3 points by taylorbuley on May 17, 2011 | past
|
| | Encrypted Google Docs done well (root.org) |
|
38 points by wglb on May 15, 2011 | past | 10 comments
|
|
|
More |