Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
The IPv6 Mess (2002)
(
cr.yp.to
)
1 point
by
tgma
5 days ago
|
past
|
discuss
NSA and IETF, Part 7
(
cr.yp.to
)
2 points
by
Tomte
15 days ago
|
past
Some thoughts on security after ten years of qmail 1.0 [pdf]
(
cr.yp.to
)
3 points
by
b-man
34 days ago
|
past
NSA and IETF – The Structure of the Debate
(
cr.yp.to
)
1 point
by
_tk_
54 days ago
|
past
|
1 comment
NSA and IETF, Part 6
(
cr.yp.to
)
13 points
by
Tomte
59 days ago
|
past
|
4 comments
NSA and IETF, Part 5
(
cr.yp.to
)
6 points
by
Tomte
61 days ago
|
past
A plea for lean software [pdf]
(
cr.yp.to
)
2 points
by
andsoitis
75 days ago
|
past
Djbsort: The fastest Intel/AMD sorting library, safe for cryptographic contexts
(
cr.yp.to
)
2 points
by
u1hcw9nx
84 days ago
|
past
Ed25519-CLI – command-line interface for the Ed25519 signature system (2024)
(
cr.yp.to
)
97 points
by
INGELRII
3 months ago
|
past
|
53 comments
NSA and IETF, part 3: Dodging the issues at hand
(
cr.yp.to
)
316 points
by
upofadown
4 months ago
|
past
|
229 comments
NSA and IETF, Part 2
(
cr.yp.to
)
16 points
by
zdw
4 months ago
|
past
|
4 comments
cdb.cr.yp.to (new version of cdb)
(
cr.yp.to
)
2 points
by
1vuio0pswjnm7
5 months ago
|
past
Notes by djb on using Fil-C
(
cr.yp.to
)
365 points
by
transpute
5 months ago
|
past
|
246 comments
Notes by djb on using Fil-C with Debian multiarch
(
cr.yp.to
)
10 points
by
fanf2
5 months ago
|
past
MODPOD: The collapse of IETF's protections for dissent
(
cr.yp.to
)
8 points
by
gjvc
5 months ago
|
past
Cdb: Add support for cdb64
(
cr.yp.to
)
86 points
by
kreco
6 months ago
|
past
|
26 comments
64-bit release of CDB by DJB
(
cr.yp.to
)
2 points
by
howerj
6 months ago
|
past
Fast, constant-time, correct: pick three – Daniel J. Bernstein [pdf]
(
cr.yp.to
)
8 points
by
nabla9
6 months ago
|
past
The collapse of IETF's protections for dissent
(
cr.yp.to
)
5 points
by
Y_Y
6 months ago
|
past
MODPOD: The collapse of IETF's protections for dissent
(
cr.yp.to
)
10 points
by
zdw
6 months ago
|
past
|
1 comment
NSA and IETF: Can an attacker purchase standardization of weakened cryptography?
(
cr.yp.to
)
251 points
by
zdw
6 months ago
|
past
|
109 comments
Surreptitious Surveillance
(
cr.yp.to
)
2 points
by
tatersolid
6 months ago
|
past
Surreptitious Surveillance
(
cr.yp.to
)
5 points
by
nabla9
6 months ago
|
past
Some thoughts on security after ten years of qmail 1.0 (2007) [pdf]
(
cr.yp.to
)
2 points
by
JNRowe
7 months ago
|
past
Complaint regarding a declaration of consensus to adopt a non-hybrid draft [pdf]
(
cr.yp.to
)
2 points
by
Perseids
8 months ago
|
past
Debunking NIST's calculation of the Kyber-512 security level (2023)
(
cr.yp.to
)
59 points
by
RA2lover
10 months ago
|
past
|
21 comments
McEliece standardization: Looking at what's happening, and analyzing rationales
(
cr.yp.to
)
5 points
by
1vuio0pswjnm7
11 months ago
|
past
The cryptoint library (DJB) [pdf]
(
cr.yp.to
)
4 points
by
frutiger
11 months ago
|
past
McEliece Standardisation
(
cr.yp.to
)
2 points
by
quadhome
12 months ago
|
past
The Cryptoint Library [pdf]
(
cr.yp.to
)
4 points
by
todsacerdoti
12 months ago
|
past
More
Consider applying for YC's Summer 2026 batch! Applications are open till May 4
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: