The inability to count correctly: Debunking the US National Institute of Standards and Technology's calculation of the cryptographic security level of Kyber-512 security Article 18 162 words 25 votes
GnuPG can now be used to perform notarial acts in the state of Washington privacy foss open source Link 15 votes
Signing CryptPad - Experiments with making a webapp secure despite the server security Article 1215 words 7 votes
Understanding extended-nonce constructions: How and why XSalsa20/XChaCha were designed, and why they’re secure Link 6 votes
Transparent and verifiable electronic elections are technically feasible, but the techniques used are not actually viable for running most elections—and definitely not for remote voting security Article 4355 words 5 votes
Using zero knowledge proofs to prove set membership without exposing the set or the member Article 1139 words, published Aug 10 2019 5 votes
SigSpoof: Spoofing signatures in GnuPG, Enigmail, GPGTools and python-gnupg (CVE-2018-12020) security Article 2307 words 5 votes
How AWS request signatures version 4 and 4a work security Article 1500 words, published Sep 9 2021 3 votes