Arthur Besse@lemmy.mlMEnglish · 1 year agoNearly-finalized eIDAS legislation requires browsers to trust state-issued CAs, and prohibits using certificate transparency to prevent abuses of them: only ETSI-approved authenticity checks allowed.plus-squarelast-chance-for-eidas.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNearly-finalized eIDAS legislation requires browsers to trust state-issued CAs, and prohibits using certificate transparency to prevent abuses of them: only ETSI-approved authenticity checks allowed.plus-squarelast-chance-for-eidas.orgArthur Besse@lemmy.mlMEnglish · 1 year agomessage-square0fedilink
Settoletto 🍤@fed.dyne.org · edit-21 year agoCrypto power to the people! plus-squarefed.dyne.orgimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageCrypto power to the people! plus-squarefed.dyne.orgSettoletto 🍤@fed.dyne.org · edit-21 year agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · edit-21 year agoThe inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level.plus-squareblog.cr.yp.toexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level.plus-squareblog.cr.yp.toArthur Besse@lemmy.mlMEnglish · edit-21 year agomessage-square0fedilink
Voyager@psychedelia.inkEnglish · edit-21 year agoQuantum Resistance and the Signal Protocolplus-squaresignal.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkQuantum Resistance and the Signal Protocolplus-squaresignal.orgVoyager@psychedelia.inkEnglish · edit-21 year agomessage-square0fedilink
overflow@lemmy.ml · 1 year agoHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogoverflow@lemmy.ml · 1 year agomessage-square0fedilink
Spzi@lemm.eeEnglish · 1 year agoAES: How to Design Secure Encryption (Spanning Tree)plus-squarepiped.videoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAES: How to Design Secure Encryption (Spanning Tree)plus-squarepiped.videoSpzi@lemm.eeEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.ml · 1 year agoInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogoverflow@lemmy.ml · 1 year agomessage-square0fedilink
tedu@azorius.net · 1 year agoThe Cryptographer Who Ensures We Can Trust Our Computersplus-squarewww.quantamagazine.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Cryptographer Who Ensures We Can Trust Our Computersplus-squarewww.quantamagazine.orgtedu@azorius.net · 1 year agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 1 year agoInterview with the ETSI Standards Organization That Created TETRA "Backdoor"plus-squarezetter.substack.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInterview with the ETSI Standards Organization That Created TETRA "Backdoor"plus-squarezetter.substack.comArthur Besse@lemmy.mlMEnglish · 1 year agomessage-square0fedilink
Arthur Besse@lemmy.mlM · 1 year agoAll cops are broadcasting: breaking TETRA after decades in the shadowsplus-squarewww.midnightblue.nlexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAll cops are broadcasting: breaking TETRA after decades in the shadowsplus-squarewww.midnightblue.nlArthur Besse@lemmy.mlM · 1 year agomessage-square0fedilink
overflow@lemmy.mlEnglish · 1 year ago17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.bevideomessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1video17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.beoverflow@lemmy.mlEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.mlEnglish · 1 year agoPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.bevideomessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1videoPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.beoverflow@lemmy.mlEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.mlEnglish · 1 year agoOn Ashton Kutcher and Secure Multi-Party Computationplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOn Ashton Kutcher and Secure Multi-Party Computationplus-squareblog.cryptographyengineering.comoverflow@lemmy.mlEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.mlEnglish · 2 years agoBook Review: Red Team Bluesplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBook Review: Red Team Bluesplus-squareblog.cryptographyengineering.comoverflow@lemmy.mlEnglish · 2 years agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 2 years agoan audit of a fintech company's threshold ECDSA implementation yielded four CVEsplus-squareresearch.kudelskisecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkan audit of a fintech company's threshold ECDSA implementation yielded four CVEsplus-squareresearch.kudelskisecurity.comArthur Besse@lemmy.mlMEnglish · 2 years agomessage-square0fedilink
overflow@lemmy.mlEnglish · 2 years agoInformation Security—Before & After Public-Key Cryptographyinvidious.projectsegfau.ltexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInformation Security—Before & After Public-Key Cryptographyinvidious.projectsegfau.ltoverflow@lemmy.mlEnglish · 2 years agomessage-square0fedilink
overflow@lemmy.mlEnglish · 2 years agoHow Not to Learn Cryptographyplus-squareesl.cs.brown.eduexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow Not to Learn Cryptographyplus-squareesl.cs.brown.eduoverflow@lemmy.mlEnglish · 2 years agomessage-square0fedilink
overflow@lemmy.mlEnglish · 2 years agoTheory and Practice of Cryptographyplus-squarevid.puffyan.usvideomessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1videoTheory and Practice of Cryptographyplus-squarevid.puffyan.usoverflow@lemmy.mlEnglish · 2 years agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · 2 years agoA Novel Related Nonce Attack for ECDSAplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Novel Related Nonce Attack for ECDSAplus-squareeprint.iacr.orgArthur Besse@lemmy.mlMEnglish · 2 years agomessage-square0fedilink
Arthur Besse@lemmy.mlMEnglish · edit-22 years agoA Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithmsplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithmsplus-squareeprint.iacr.orgArthur Besse@lemmy.mlMEnglish · edit-22 years agomessage-square0fedilink