Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by kkl
Go's filepath.Clean does not prevent path traversal
2 points
kkl
2026-01-29T14:44:49Z
argemma.com
String comparison timing attacks in Go
1 points
kkl
2026-01-05T16:53:47Z
kel.bz
Confessions to a Data Lake
36 points
kkl
2025-12-23T17:51:13Z
confer.to
Control planes are a useful concept
2 points
kkl
2025-12-16T02:06:15Z
kel.bz
Authenticated Dictionaries with Skip Lists and Commutative Hashing
3 points
kkl
2020-01-05T22:08:18Z
kel.bz
RSA-Based Key Encapsulation Mechanisms
1 points
kkl
2019-05-27T17:50:53Z
kel.bz
Building lattice reduction (LLL) intuition
81 points
kkl
2017-07-25T13:33:29Z
kel.bz
The Goldreich–Goldwasser–Halevi (GGH) Cryptosystem
2 points
kkl
2017-04-26T03:50:54Z
kel.bz
Some challenges in post-quantum standardization
3 points
kkl
2016-10-31T01:56:35Z
blog.cr.yp.to
Why PKCS#1v1.5 Signature Should (Also) Be Put Out of Our Misery
1 points
kkl
2016-08-09T23:20:36Z
cryptosense.com
Executing non-alphanumeric JavaScript without parentheses
123 points
kkl
2016-07-15T14:57:08Z
blog.portswigger.net
Encrypted Email Obstacles and Experiments
1 points
kkl
2016-06-13T00:18:45Z
moderncrypto.org
Web Storage: the lesser evil for session tokens
195 points
kkl
2016-05-31T14:20:30Z
blog.portswigger.net
Security challenges for the Qubes build process
64 points
kkl
2016-05-30T13:03:03Z
blog.invisiblethings.org
BLESS: SSH Certificate Authority for Ephemeral SSH Sessions
54 points
kkl
2016-05-21T22:17:34Z
github.com
Signal Protocol and Deniable Authentication
3 points
kkl
2016-05-17T19:43:47Z
www.praetorian.com
A Systematic Analysis of the Juniper Dual EC Incident
1 points
kkl
2016-04-15T19:26:08Z
eprint.iacr.org
Scalable vendor security reviews
1 points
kkl
2016-03-07T20:14:10Z
googleonlinesecurity.blogspot.com
Go Proverbs Illustrated
3 points
kkl
2016-01-03T15:37:17Z
www.gregosuri.com
PQCHacks: A gentle introduction to post-quantum cryptography
2 points
kkl
2015-12-28T14:52:55Z
www.youtube.com