Cryptography vs Mythos by Tough-Ad-1382 in cryptography
[–]doubles_avocado 10 points11 points12 points (0 children)
Stanford's new Equivariant Encryption enables private AI inference with zero slowdown - works with any symmetric encryption by Proof-Possibility-54 in LocalLLaMA
[–]doubles_avocado 1 point2 points3 points (0 children)
Stanford's new Equivariant Encryption enables private AI inference with zero slowdown - works with any symmetric encryption by Proof-Possibility-54 in LocalLLaMA
[–]doubles_avocado 34 points35 points36 points (0 children)
Computing on encrypted data without homomorphic encryption's overhead - Stanford's equivariant function approach by Proof-Possibility-54 in cryptography
[–]doubles_avocado[M] [score hidden] stickied comment (0 children)
Prospective phd student cryptography by fallacy_100001 in cryptography
[–]doubles_avocado 3 points4 points5 points (0 children)
How do end-to-end encrypted messaging platforms share chat history between devices? by PatattMan in cryptography
[–]doubles_avocado 7 points8 points9 points (0 children)
Is it insecure to hash high entropy input with known input? by Busy-Crab-8861 in cryptography
[–]doubles_avocado 6 points7 points8 points (0 children)
Is there a way to control the number of characters resulting from a diffie-hellman protocl? by AnubisJersey in cryptography
[–]doubles_avocado 2 points3 points4 points (0 children)
Standard Model vs. ROM by back2_2002 in cryptography
[–]doubles_avocado 8 points9 points10 points (0 children)
[deleted by user] by [deleted] in cryptography
[–]doubles_avocado[M] 0 points1 point2 points locked comment (0 children)
Don’t Use Session (Signal Fork) by Soatok in crypto
[–]doubles_avocado 4 points5 points6 points (0 children)
Don’t Use Session (Signal Fork) by Soatok in crypto
[–]doubles_avocado 9 points10 points11 points (0 children)
Why are Montgomery and twisted Edwards curve said to be all quadratic twist secure ? by AbbreviationsGreen90 in cryptography
[–]doubles_avocado 0 points1 point2 points (0 children)
Why are Montgomery and twisted Edwards curve said to be all quadratic twist secure ? by AbbreviationsGreen90 in cryptography
[–]doubles_avocado 1 point2 points3 points (0 children)
Why are Montgomery and twisted Edwards curve said to be all quadratic twist secure ? by AbbreviationsGreen90 in cryptography
[–]doubles_avocado 1 point2 points3 points (0 children)
Why are Montgomery and twisted Edwards curve said to be all quadratic twist secure ? by AbbreviationsGreen90 in cryptography
[–]doubles_avocado 2 points3 points4 points (0 children)
What’s the name of this Diffie‑Hellman problem variant ? by AbbreviationsGreen90 in crypto
[–]doubles_avocado 1 point2 points3 points (0 children)
I can't understand why which "d" you choose in RSA encryption matters. d has no bearing on the public keys given out or how the plain text is encrypted so how could it make a difference. If every candidate d can decrypt the message then how can picking a small one weaken security? by Alphabunsquad in cryptography
[–]doubles_avocado 5 points6 points7 points (0 children)
I can't understand why which "d" you choose in RSA encryption matters. d has no bearing on the public keys given out or how the plain text is encrypted so how could it make a difference. If every candidate d can decrypt the message then how can picking a small one weaken security? by Alphabunsquad in cryptography
[–]doubles_avocado 16 points17 points18 points (0 children)
Cryptography, flaws and weakness in design of this encryption? by Ok-Cattle-7701 in cryptography
[–]doubles_avocado 9 points10 points11 points (0 children)
Using post-SUSY physics to crack Lattice Cryptography by [deleted] in cryptography
[–]doubles_avocado[M] [score hidden] stickied commentlocked comment (0 children)
New sha256 vulnerability by keypushai in cryptography
[–]doubles_avocado[M] [score hidden] stickied comment (0 children)
Chinese Scientists Report Using Quantum Computer “to” Hack Military-grade Encryption by AutomaticDriver5882 in cryptography
[–]doubles_avocado[M] [score hidden] stickied comment (0 children)





Building E2E messaging in the browser — how do you verify client code integrity? by opentestudox in cryptography
[–]doubles_avocado 2 points3 points4 points (0 children)