https://eyalro.net
signal.org/blog/introducing-secure-backups
signal.org/blog/introducing-secure-backups
ec.europa.eu/commission/p...
ec.europa.eu/commission/p...
#IronMaiden #RunForYourLivesWorldTour #IronMaiden50
@ironmaiden.bsky.social
#IronMaiden #RunForYourLivesWorldTour #IronMaiden50
@ironmaiden.bsky.social
martinralbrecht.wordpress.com/2025/06/14/o...
martinralbrecht.wordpress.com/2025/06/14/o...
You'll review artifacts of accepted papers. We especially encourage junior/senior PhD students & PostDocs to help. Distinguished reviews will get awards!
You'll review artifacts of accepted papers. We especially encourage junior/senior PhD students & PostDocs to help. Distinguished reviews will get awards!
The number of pages clearly keeps increasing. That includes more features to defend networks, but also more features to potentially abuse 👀
The number of pages clearly keeps increasing. That includes more features to defend networks, but also more features to potentially abuse 👀
Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye
https://arxiv.org/abs/2504.11208
Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye
https://arxiv.org/abs/2504.11208
Joan Daemen,
Thomas Johansson,
Anna Lysyanskaya,
Pascal Paillier,
J.R. Rao,
Alon Rosen,
Elaine Shi,
Bo-Yin Yang.
iacr.org/fellows/
#cryptography
Joan Daemen,
Thomas Johansson,
Anna Lysyanskaya,
Pascal Paillier,
J.R. Rao,
Alon Rosen,
Elaine Shi,
Bo-Yin Yang.
iacr.org/fellows/
#cryptography
eprint.iacr.org/2025/288.pdf
#realworldcrypto
eprint.iacr.org/2025/288.pdf
#realworldcrypto
rwc.iacr.org/2025/program...
A huge thanks to my co-chair @malb.bsky.social and all the amazing program committee members for helping put this together. I'm looking forward to seeing everyone in Sofia!
#realworldcrypto
rwc.iacr.org/2025/program...
A huge thanks to my co-chair @malb.bsky.social and all the amazing program committee members for helping put this together. I'm looking forward to seeing everyone in Sofia!
#realworldcrypto
These vulnerable servers can be abused as proxies to launch DDoS attacks and possibly to access internal networks.
These vulnerable servers can be abused as proxies to launch DDoS attacks and possibly to access internal networks.