229 |
Claude Shannon: The Mathematical Theory of Cryptography |
2021-03-17 |
108 |
Evervault |
2021-12-17 |
81 |
How we built the Evervault Encryption Engine (E3) |
2021-08-10 |
67 |
The most important cryptography papers |
2024-05-03 |
26 |
Shamir's Secret Sharing Visualised |
2022-10-05 |
16 |
Is Encryption at Rest a Scam? |
2023-09-21 |
16 |
Why enclaves exist: from von Neumann to secure enclaves |
2023-04-27 |
16 |
Evervault: encryption infrastructure for developers |
2021-08-31 |
15 |
How to encrypt a string in less than 5 minutes |
2022-09-29 |
13 |
We Built Cages: Deploying to an Enclave |
2023-04-04 |
12 |
Did DORA's last update create an encryption loophole? |
2024-10-23 |
12 |
Understanding Quantum Cryptography |
2023-06-22 |
11 |
The Danish Sugar Beats Auction pioneered privacy-first multi-party computation |
2023-08-10 |
11 |
Build, deploy and scale secure enclaves using Evervault Cages |
2023-02-09 |
9 |
How We Built Evervault Relay |
2022-03-08 |
6 |
Building an Open-Source Runtime for Confidential Computing on Nitro Enclaves |
2023-03-30 |
5 |
We Built Cages: TLS cert provisioning and secrets management in an enclave |
2023-04-11 |
5 |
Can Google's federated learning strategy be exploited? |
2023-07-10 |
5 |
A Visualisation of Shamir's Secret Sharing Scheme |
2022-10-08 |
4 |
How to address unexpected clock drift when building on AWS Nitro Enclaves |
2024-02-27 |
4 |
Show HN: Evervault Enclaves – Confidential Computing made easy |
2024-01-10 |
4 |
Optimizing encryption speed with Rust and AWS Nitro Enclaves |
2023-05-11 |
3 |
A security paradigm for 2024: Access To, Access From (ATAF) |
2023-12-05 |
3 |
The Story and Math of Differential Cryptanalysis |
2023-09-27 |
3 |
Building Cages: Open-Source Runtime for Confidential Computing on Nitro Enclaves |
2023-03-28 |
3 |
What’s going on with SHA-1? (it’s in SHAmbles) |
2023-03-23 |
3 |
Zero Day Security |
2022-09-03 |
3 |
The Evervault Encryption Manifesto |
2021-08-11 |
2 |
API integrations are making the internet less secure (opinion piece) |
2023-06-01 |
2 |
Show HN: Redact PII for OpenAI with a simple proxy |
2023-07-19 |
2 |
Code Attestation needs to be easier |
2023-05-30 |
2 |
What are Network Tokens and how do they work? |
2024-11-14 |
2 |
The power and limits of confidential computing |
2024-02-21 |
2 |
A case for encryption by third-party proxy |
2023-08-11 |
2 |
A Guide to Good DX, Part 1: Introducing DXmas |
2022-12-01 |
2 |
Code That Encrypts Itself (encrypted equivalent of a Quine) |
2022-10-14 |
1 |
How We Built Enclaves: Routing Traffic with Consul |
2024-02-08 |
1 |
Enclave Networking with Iptables |
2024-02-01 |
1 |
Show HN: Evervault Enclaves |
2024-01-16 |
1 |
Data Policies: Applying IAM to data instead of encryption keys |
2023-11-09 |
1 |
Quantum secrecy – A brief on quantum cryptography and quantum cryptanalysis |
2023-07-03 |
1 |
We Built Cages: Our Take on Secure Enclaves |
2023-03-09 |
1 |
Stibitz: The father of the modern digital computer |
2023-01-31 |
1 |
How to Build an App with Field Level Encryption |
2022-09-22 |
1 |
Tokenization vs. In-House Encryption vs. Evervault Encryption – Blog – Evervault |
2022-08-20 |
1 |
Evervault Payments Config |
2022-05-26 |