76
2
Show HN: Silly SF Tech Billboards (sillysfbillboards.com)
14
Constant-Time Code: The Pessimist Case [pdf] (iacr.org)
2
The Feds Push for WebAssembly Security over eBPF (thenewstack.io)
3
Protecting Signal Keys on Desktop with Yubikeys (sandboxaq.com)
2
Show HN: Coffee Beans Tracker with OCR Inventory Management on GPT
4
How to manage a quantum computing emergency (educatedguesswork.org)
5
Design choices for post-quantum TLS (educatedguesswork.org)
62
Google's threat model for post-quantum cryptography (bughunters.google.com)
2
eBPF Load Balancing with Katran (fedepaol.github.io)
2
Apps by Apple (apple.com)
1
New NIST Post-Quantum Digital Signatures (nist.gov)
1
(Interactively) Summarize YouTube videos for you (chatmedia.io)
3
Google Kills Passwords (wired.com)
1
Is sidecar-less eBPF service mesh secure? (techtarget.com)
3
Envoy: The Proxy for the Future (youtube.com)
8
Cilium Mesh – One Mesh to Connect Them All (isovalent.com)
1
Batched Merkle tree signatures in TLS (iacr.org)
1
A Gentle Introduction to Number Theoretic Transform (sandboxaq.com)
1
Exploring Kyber in Python – Part I (sandboxaq.com)
1
Adding an In-Kernel TLS Handshake (lwn.net)
44
TurboTLS: TLS connection establishment with 1 less round trip (arxiv.org)
1