Hacker News new | past | comments | ask | show | jobs | submit | from login
Dead-listing while on vacation (2008) (root.org)
1 point by cpach on Aug 23, 2022 | past
Stuxnet is embarrassing, not amazing (2011) (root.org)
117 points by rdpintqogeogsaa on June 12, 2022 | past | 91 comments
Internet Protocol Design (root.org)
1 point by autoditype on Jan 17, 2021 | past
Software protection: Protecting the protection code (root.org)
1 point by beefhash on June 28, 2020 | past
Stuxnet was embarrassing, not amazing (2011) (root.org)
121 points by MrXOR on Nov 3, 2019 | past | 82 comments
Recovering a private key with only a fraction of the bits – rdist (root.org)
1 point by aburan28 on Dec 7, 2017 | past
Final Post on JavaScript Crypto (root.org)
2 points by rfreytag on March 10, 2015 | past
Timing-safe memcmp and API parity (root.org)
6 points by wglb on June 25, 2014 | past
In Defense of JavaScript Crypto (root.org)
5 points by sweis on June 23, 2014 | past
Final post on JavaScript crypto (root.org)
1 point by wglb on June 17, 2014 | past
Digging into the NSA revelations (root.org)
3 points by steveklabnik on Jan 12, 2014 | past
RSA public keys are not private (implementation) (root.org)
1 point by ColinWright on April 25, 2013 | past
Has HTML5 made us more secure? (root.org)
2 points by B-Con on Dec 4, 2012 | past
Cyber Weapon Authors Catch Up On Blog Reading (root.org)
4 points by tptacek on Aug 14, 2012 | past
RSA repeats earlier claims, but louder (root.org)
2 points by wglb on June 29, 2012 | past
Why RSA is misleading about SecurID vulnerability (root.org)
3 points by wglb on June 28, 2012 | past
Why stream ciphers shouldn’t be used for hashing (root.org)
1 point by wglb on Jan 31, 2012 | past
More on the evolution of password security (root.org)
2 points by wglb on Jan 19, 2012 | past
On the evolving security of password schemes (root.org)
2 points by KateLawson on Jan 10, 2012 | past | 1 comment
Mixed voltage interfacing for design or hacking (root.org)
1 point by wglb on Jan 6, 2012 | past
Internet Protocol Design and Implementation (root.org)
1 point by powertower on Dec 30, 2011 | past
The lost Van Jacobson paper that could save the Internet (root.org)
280 points by wglb on Dec 30, 2011 | past | 48 comments
Stop using unsafe keyed hashes, use HMAC (root.org)
1 point by fosk on Dec 12, 2011 | past
Recovering a private key with only a fraction of the bits (root.org)
4 points by wglb on Sept 23, 2011 | past
The HDCP magic inside Bunnie's NeTV (root.org)
15 points by fanf2 on Sept 14, 2011 | past | 1 comment
Old programming habits die hard (root.org)
3 points by l0stman on Sept 3, 2011 | past
Quantum cryptography is useless (root.org)
2 points by karlzt on Aug 16, 2011 | past
Intermediate cryptography resources (root.org)
8 points by there on June 28, 2011 | past
State space explosion in program analysis and crypto (root.org)
3 points by taylorbuley on May 17, 2011 | past
Encrypted Google Docs done well (root.org)
38 points by wglb on May 15, 2011 | past | 10 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: