Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by E-Oks
Key Distribution vs. Key Management?
3 points
e-sushi
2016-12-26T00:18:57Z
crypto.stackexchange.com
Is password-based AES encryption secure at all?
2 points
e-sushi
2016-12-26T00:15:25Z
crypto.stackexchange.com
Is it possible to see animals from space?
1 points
e-sushi
2016-12-23T23:45:35Z
space.stackexchange.com
Is every parallelogram a rectangle?
1 points
e-sushi
2016-12-23T23:43:23Z
math.stackexchange.com
I want to become a living god
2 points
e-sushi
2016-12-23T23:39:51Z
worldbuilding.stackexchange.com
Do Quantum Key Distribution and Physical Unclonable Functions Combine, and How?
1 points
e-sushi
2016-12-23T23:34:32Z
crypto.stackexchange.com
Can we design a public-key infrastructure without certificate authorities?
2 points
e-sushi
2016-12-23T23:28:08Z
crypto.stackexchange.com
What is a real-world metaphor for irrational numbers?
2 points
e-sushi
2016-12-23T16:44:38Z
math.stackexchange.com
Office wants infinite branch merges as policy; what other options do we have?
1 points
e-sushi
2016-12-23T16:44:01Z
softwareengineering.stackexchange.com
Snowman Bowling
1 points
e-sushi
2016-12-23T16:25:27Z
codegolf.stackexchange.com
What happens to one in afterlife who doesn't believe in God?
1 points
e-sushi
2016-12-23T16:24:52Z
hinduism.stackexchange.com
The female equivalent of “don't break my balls”
1 points
e-sushi
2016-12-23T16:24:06Z
ell.stackexchange.com
Where can I find test vectors for ciphers?
1 points
e-sushi
2016-12-23T16:21:12Z
crypto.stackexchange.com
What is the difference between CSPRNG and PRNG?
1 points
e-sushi
2016-12-23T16:02:15Z
crypto.stackexchange.com
Schnorr protocol: how does malicious verifier win?
1 points
e-sushi
2016-12-23T15:47:44Z
crypto.stackexchange.com
What is the difference between a 'cipher' and a 'mode of operation'?
2 points
e-sushi
2016-12-18T01:42:46Z
crypto.stackexchange.com
How long will it take to crack passwords stolen as Yahoo announced 14-12-2016?
2 points
e-sushi
2016-12-16T14:14:49Z
security.stackexchange.com
Where can I find NTRU test vectors?
1 points
e-sushi
2016-12-16T13:15:43Z
crypto.stackexchange.com
Dice rolls as entropy source for cryptographic purposes?
1 points
e-sushi
2016-12-16T12:20:58Z
crypto.stackexchange.com
How to visualize that ECB is a dangerous mode of ecryption
2 points
e-sushi
2016-12-15T20:35:22Z
imgur.com
11
12
13
14
15
16
17
18
19
20