Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by syllogism-e
How long will it take for the amount of living to exceed the dead population?
2 points
e-sushi
2016-12-27T22:26:20Z
worldbuilding.stackexchange.com
Is there a standard for OpenSSL-interoperable AES encryption?
1 points
e-sushi
2016-12-26T00:21:05Z
crypto.stackexchange.com
Can I use PBKDF2 as a stream cipher?
4 points
e-sushi
2016-12-26T00:19:42Z
crypto.stackexchange.com
Key Distribution vs. Key Management?
3 points
e-sushi
2016-12-26T00:18:57Z
crypto.stackexchange.com
Is password-based AES encryption secure at all?
2 points
e-sushi
2016-12-26T00:15:25Z
crypto.stackexchange.com
Is it possible to see animals from space?
1 points
e-sushi
2016-12-23T23:45:35Z
space.stackexchange.com
Is every parallelogram a rectangle?
1 points
e-sushi
2016-12-23T23:43:23Z
math.stackexchange.com
I want to become a living god
2 points
e-sushi
2016-12-23T23:39:51Z
worldbuilding.stackexchange.com
Do Quantum Key Distribution and Physical Unclonable Functions Combine, and How?
1 points
e-sushi
2016-12-23T23:34:32Z
crypto.stackexchange.com
Can we design a public-key infrastructure without certificate authorities?
2 points
e-sushi
2016-12-23T23:28:08Z
crypto.stackexchange.com
What is a real-world metaphor for irrational numbers?
2 points
e-sushi
2016-12-23T16:44:38Z
math.stackexchange.com
Office wants infinite branch merges as policy; what other options do we have?
1 points
e-sushi
2016-12-23T16:44:01Z
softwareengineering.stackexchange.com
Snowman Bowling
1 points
e-sushi
2016-12-23T16:25:27Z
codegolf.stackexchange.com
What happens to one in afterlife who doesn't believe in God?
1 points
e-sushi
2016-12-23T16:24:52Z
hinduism.stackexchange.com
The female equivalent of “don't break my balls”
1 points
e-sushi
2016-12-23T16:24:06Z
ell.stackexchange.com
Where can I find test vectors for ciphers?
1 points
e-sushi
2016-12-23T16:21:12Z
crypto.stackexchange.com
What is the difference between CSPRNG and PRNG?
1 points
e-sushi
2016-12-23T16:02:15Z
crypto.stackexchange.com
Schnorr protocol: how does malicious verifier win?
1 points
e-sushi
2016-12-23T15:47:44Z
crypto.stackexchange.com
What is the difference between a 'cipher' and a 'mode of operation'?
2 points
e-sushi
2016-12-18T01:42:46Z
crypto.stackexchange.com
How long will it take to crack passwords stolen as Yahoo announced 14-12-2016?
2 points
e-sushi
2016-12-16T14:14:49Z
security.stackexchange.com
12
13
14
15
16
17
18
19
20
21