TE
TechEcho
Home
24h Top
Newest
Best
Ask
Show
Jobs
English
GitHub
Twitter
Back to Profile
Submissions by rdpintqogeogsaa
1
Picking Parameters
3 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
2
Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-Donna
2 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
3
Capability Hardware Enhanced RISC Instructions (CHERI)
1 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
4
Webauthn in Linux with a TPM via the HID Gadget (2019)
1 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
5
Timing Attacks
191 points
by
rdpintqogeogsaa
almost 3 years ago
34 comments
6
Himitsu: A Secret Storage Manager
2 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
7
List of unsafe ed25519 signature libs
4 points
by
rdpintqogeogsaa
almost 3 years ago
1 comment
8
Password policies of most top websites fail to follow best practices
34 points
by
rdpintqogeogsaa
almost 3 years ago
19 comments
9
fiat-crypto: Cryptographic Primitive Code Generation by Fiat
1 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
10
Stuxnet is embarrassing, not amazing (2011)
117 points
by
rdpintqogeogsaa
almost 3 years ago
91 comments
11
BearSSL
2 points
by
rdpintqogeogsaa
almost 3 years ago
1 comment
12
OpenSMTPD
98 points
by
rdpintqogeogsaa
almost 3 years ago
35 comments
13
“Legacy” Cryptography in Fedora 36 and Red Hat Enterprise Linux 9
1 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
14
Responses to NIST's Proposal (1992)
1 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
15
Building Protocols with HTTP
2 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
16
Haiku Activity and Contract May 2022
4 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
17
TLS Certificate Transparency logs don't always talk to you
9 points
by
rdpintqogeogsaa
almost 3 years ago
5 comments
18
Exploiting the Wii U's USB Descriptor parsing
1 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
19
One-end encryption, stronger than end-to-end
20 points
by
rdpintqogeogsaa
almost 3 years ago
5 comments
20
Child of the Internet
2 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
21
Guidance on Implementing Cryptography as a Developer
3 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
22
Boot drive encryption security on Windows
3 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
23
Dangerous Gift
326 points
by
rdpintqogeogsaa
almost 3 years ago
137 comments
24
The Law of Strict Licenses
2 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
25
Electrifying Ext4
2 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
26
Small is beautiful! (2015)
1 points
by
rdpintqogeogsaa
almost 3 years ago
no comments
27
GoodWill ransomware forces victims to donate to the poor
503 points
by
rdpintqogeogsaa
almost 3 years ago
340 comments
← Previous
Next →