Hacker Newsnew | past | comments | ask | show | jobs | submit | YAYERKA's submissionslogin
1.What Happened to the Crypto Dream?, Part 2 [pdf] (randomwalker.info)
2 points by YAYERKA on Oct 19, 2015 | past
2.What Happened to the Crypto Dream?, Part 1 [pdf] (randomwalker.info)
2 points by YAYERKA on Oct 19, 2015 | past
3.The Evolution of Authenticated Encryption (2013) [pdf] (stanford.edu)
3 points by YAYERKA on Sept 23, 2015 | past
4.Attacking ECMAScript Engines with Redefinition (googleprojectzero.blogspot.com)
9 points by YAYERKA on Aug 17, 2015 | past
5.Lisp as the Maxwell’s equations of software (2012) (michaelnielsen.org)
115 points by YAYERKA on May 26, 2015 | past | 8 comments
6.Alberto Santos-Dumont (wikipedia.org)
76 points by YAYERKA on May 13, 2015 | past | 13 comments
7.Freestart collision for 76-steps SHA-1 (marc-stevens.nl)
2 points by YAYERKA on May 10, 2015 | past
8.TLS with Adam Langley at Yahoo Trust Unconference (yahoo.com)
1 point by YAYERKA on May 5, 2015 | past
9.Effective Go (golang.org)
2 points by YAYERKA on May 2, 2015 | past
10.Intro x86 (32 bit) by OpenSecurityTraining (youtube.com)
1 point by YAYERKA on April 28, 2015 | past
11. [dupe] The Spy in the Sandbox – Practical Cache Attacks in JavaScript (arxiv.org)
2 points by YAYERKA on April 26, 2015 | past
12.Ishango bone (wikipedia.org)
7 points by YAYERKA on April 26, 2015 | past | 2 comments
13.CSE508: Network Security (PhD Section), Spring 2015 (stonybrook.edu)
1 point by YAYERKA on April 23, 2015 | past
14.MIT 6.858: Computer Systems Security (youtube.com)
1 point by YAYERKA on April 15, 2015 | past
15.Automated algebraic cryptanalysis with OpenREIL and Z3 (cr4.sh)
18 points by YAYERKA on March 21, 2015 | past
16.CryptoAction (youtube.com)
1 point by YAYERKA on March 6, 2015 | past
17.Research at Google (research.google.com)
1 point by YAYERKA on Feb 10, 2015 | past
18.The Stanford Natural Language Processing Reading Group Schedule (stanford.edu)
1 point by YAYERKA on Feb 10, 2015 | past
19.Failed Software Economics (pchiusano.github.io)
1 point by YAYERKA on Dec 18, 2014 | past
20.PiP 2014: Principles in Practice (cam.ac.uk)
1 point by YAYERKA on Dec 15, 2014 | past
21.The Ethos Operating System (ethos-os.org)
3 points by YAYERKA on Dec 11, 2014 | past
22.Ultimate physical limits to computation (arxiv.org)
1 point by YAYERKA on Dec 9, 2014 | past
23.The Ur Programming Language (impredicative.com)
2 points by YAYERKA on Dec 5, 2014 | past
24.Swift Boating in Modern Cryptography (in-theory.blogspot.com)
2 points by YAYERKA on Dec 5, 2014 | past
25.Grothendieck Inequality (wikipedia.org)
2 points by YAYERKA on Nov 26, 2014 | past | 1 comment
26.Douglas Engelbart (wikipedia.org)
2 points by YAYERKA on Nov 26, 2014 | past
27.Is Ebola adapting? (bedford.io)
4 points by YAYERKA on Nov 11, 2014 | past
28. [dupe] Computers in Spaceflight: The NASA Experience (nasa.gov)
1 point by YAYERKA on Nov 3, 2014 | past
29.3rd BIU Winter School on Cryptography 2013 (youtube.com)
2 points by YAYERKA on Oct 29, 2014 | past
30.PhotoMath (vimeo.com)
4 points by YAYERKA on Oct 22, 2014 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: