Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by alex-e
Most smartphone users download zero apps per month
3 points
e-sushi
2016-12-02T18:52:39Z
qz.com
DARPA's Tern drone passes milestones
1 points
e-sushi
2016-12-02T18:47:00Z
defensesystems.com
WikiLeaks’ Public Donation Address Receives 4000th Bitcoin
2 points
e-sushi
2016-12-02T18:46:28Z
electronic-sushi.tumblr.com
Why can't I reverse a hash to a possible input?
1 points
e-sushi
2016-11-24T00:49:56Z
crypto.stackexchange.com
Find out what your favorite GitHub languages are
1 points
alex-benoit
2016-11-19T13:36:26Z
www.github-languages.com
What is straight line black box reduction?
1 points
e-sushi
2016-11-17T17:51:42Z
crypto.stackexchange.com
9Gag Night Mode for the desktop (chrome extension – unofficial)
1 points
alex-benoit
2016-11-16T18:42:20Z
github.com
Find out what you favorite programming languages are
5 points
alex-benoit
2016-11-16T14:14:43Z
github-languages.com
Adobe Just Debuted a ‘Photoshop’ for Audio and It’s Kind of Terrifying
1 points
e-sushi
2016-11-13T16:05:02Z
twistedsifter.com
What is so special about elliptic curves?
3 points
e-sushi
2016-11-13T14:37:50Z
crypto.stackexchange.com
“I have an idea for an app, but my budget is limited.”
1 points
e-nephy
2016-11-08T19:00:36Z
easternpeak.com
How difficult is it to practically detect a forgery in a cryptosystem?
1 points
e-sushi
2016-11-08T14:55:16Z
crypto.stackexchange.com
Visual Studio Code rolls back to 1.6.1 due to bug in IntelliSense
1 points
alexives
2016-11-03T15:26:13Z
twitter.com
How to develop smartwatch apps for business?
1 points
e-nephy
2016-11-02T18:24:41Z
easternpeak.com
Truncated 60 bit SHA1 collision detection – brute-forcing issues
3 points
e-sushi
2016-10-31T00:09:14Z
crypto.stackexchange.com
Is there an upper limit to plaintext size in Salsa20?
2 points
e-sushi
2016-10-30T17:12:48Z
crypto.stackexchange.com
Android Instant Apps. 2017 Trends: Apps that run without downloading
1 points
e-nephy
2016-10-29T22:11:49Z
easternpeak.com
Why are only passwords hashed?
1 points
e-sushi
2016-10-28T22:47:37Z
security.stackexchange.com
What does a real quantum computer need for cryptanalysis and/or attack purposes?
1 points
e-sushi
2016-10-22T21:05:47Z
crypto.stackexchange.com
Yipp-e
1 points
yipp-e
2016-10-19T01:48:15Z
yipp-e.com
27
28
29
30
31
32
33
34
35
36