Skip to main content

Cryptography

The State of OpenSSL for pyca/cryptography
Cryptography Programming Reading
Internet Security Research Group (ISRG) 2025 Annual Report
Cryptography Systems Reading
Signatures are like backups (2024)
Cryptography Systems Reading
Behind the Scenes with iOS Security (2016)
Memory Safety Cryptography Zeroization Watching
Against Cipher Agility in Cryptography Protocols (2019)
Cryptography Secure Design Reading
Key Transparency: Introduction, recent results, and active research areas - Melissa Chase
Cryptography Transparency Watching Key Management
Picking parameters (2022)
Cryptography Reading
Invisible Salamanders Are Not What You Think (2024)
Cryptography Key Management Reading
Building a Transparent Keyserver
Transparency Cryptography Key Management Reading
Experimenting with Post-Quantum Cryptography
Cryptography Post-Quantum Cryptography Reading
The Typestate Pattern in Rust
Rust Programming Secure Design Cryptography Reading
Too Much Crypto (2019)
Cryptography Reading
Don't wait for FHE, encryption-in-use is possible today*!
Don't wait for FHE, encryption-in-use is possible today*!
*terms and conditions may apply.
Programming Cryptography Fully Homomorphic Encryption Encryption-in-Use Searchable Encryption Somewhat Homomorphic Encryption Oram
A Tour of WebAuthn (2024)
Passkeys Cryptography Reading
Scrypt is Maximally Memory-Hard (2016)
Cryptography Kdfs Reading
Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation (2005)
Zeroization Cryptography Reading
Zero Knowledge Proofs Alone Are Not a Digital ID Solution to Protecting User Privacy
Privacy Cryptography Zero-Knowledge Proofs Reading Eff
High-assurance zeroization (2023)
Zeroization Cryptography Reading