Hacker Newsnew | past | comments | ask | show | jobs | submit | christianbryant's submissionslogin
1.Lightweight ASIP Design for Lattice-Based Post-Quantum Cryptography Algorithms (springer.com)
1 point by christianbryant on July 3, 2024 | past | 1 comment
2.Unraveling a blockchain-based framework towards patient empowerment (nih.gov)
1 point by christianbryant on July 3, 2024 | past | 1 comment
3.Verifying Quantum Proofs with Entangled Games (simons.berkeley.edu)
14 points by christianbryant on May 24, 2019 | past | 2 comments
4.Arc/Nu – Rewrite of Arc 3.1 in Racket – Faster and More Features (github.com/arclanguage)
3 points by christianbryant on July 18, 2018 | past
5.Network Programming in ANSI Common Lisp with IOLib (2010) (wisc.edu)
3 points by christianbryant on July 17, 2018 | past
6.Ask HN: They cried “Gna! is shutting down” but were they not heard?
1 point by christianbryant on July 16, 2018 | past | 1 comment
7.Mu: Turn arbitrary manual tests into reproducible automated tests (github.com/akkartik)
1 point by christianbryant on July 15, 2018 | past
8.Anarki – Community-managed fork of the Arc dialect of Lisp (github.com/arclanguage)
126 points by christianbryant on July 15, 2018 | past | 44 comments
9.Intertwingularity (wikipedia.org)
1 point by christianbryant on July 13, 2018 | past | 1 comment
10.Barrett Brown's Pursuance Project – Activism Amplified and Encrypted (pursuanceproject.org)
1 point by christianbryant on July 13, 2018 | past
11.“Personal Information” per California Consumer Privacy Act of 2018 (CCPA) (ca.gov)
2 points by christianbryant on July 11, 2018 | past
12.Cybersecurity Journal – A New Journal from SpringerOpen (springeropen.com)
1 point by christianbryant on July 11, 2018 | past
13.AT&T to Buy AlienVault (darkreading.com)
2 points by christianbryant on July 11, 2018 | past
14.Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes (springeropen.com)
12 points by christianbryant on July 8, 2018 | past | 3 comments
15.2018 Isn't the Year of the GNU Hurd (phoronix.com)
4 points by christianbryant on July 8, 2018 | past | 1 comment
16.Making Bitcoin Legal [pdf] (cam.ac.uk)
2 points by christianbryant on July 8, 2018 | past
17.BT has built the UK's first quantum-secured high-speed fibre network (bt.com)
1 point by christianbryant on July 7, 2018 | past
18.Optical cryptography with biometrics for multi-depth objects (nature.com)
1 point by christianbryant on July 7, 2018 | past
19.US government: Help us protect computers from quantum hacking (cnet.com)
1 point by christianbryant on Jan 12, 2017 | past
20.NIST CSRC Post-Quantum Cryptography Project (nist.gov)
2 points by christianbryant on Jan 12, 2017 | past | 2 comments
21.Secure ATM Door Locking System Using RFID (springer.com)
1 point by christianbryant on Jan 11, 2017 | past
22.Ask HN: Top Sources for Site Defacement Archives
1 point by christianbryant on Jan 8, 2017 | past
23.Artificial Intelligence Might Solve the Security Skills Shortage (darkreading.com)
26 points by christianbryant on Dec 28, 2016 | past | 9 comments
24.Ask HN: What Are the Best Current Methods to Delete Yourself from the Internet?
239 points by christianbryant on Dec 24, 2016 | past | 158 comments
25.Ask HN: How Would You Design a “Net Invisible” System
1 point by christianbryant on Dec 23, 2016 | past | 2 comments
26.Cobalt ATM Hacks (A Positive Technologies Report) [pdf] (ptsecurity.com)
3 points by christianbryant on Dec 22, 2016 | past
27.The Formal Design Model of an Automatic Teller Machine (ATM) [pdf] (researchgate.net)
10 points by christianbryant on Dec 22, 2016 | past | 1 comment
28.Countermeasure against blinding attacks on low-noise detectors (aps.org)
1 point by christianbryant on Dec 20, 2016 | past
29.Can Photon Probabilities Change the World? (huffingtonpost.com)
2 points by christianbryant on Feb 1, 2016 | past
30.7ev3n Ransomware trashes your PC and then demands 13 Bitcoins (bleepingcomputer.com)
3 points by christianbryant on Jan 30, 2016 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: