Tag: hash function
-
Hacker News: Clean, a formal verification DSL for ZK circuits in Lean4
Source URL: https://blog.zksecurity.xyz/posts/clean/ Source: Hacker News Title: Clean, a formal verification DSL for ZK circuits in Lean4 Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The provided text discusses the development of an embedded Domain-Specific Language (DSL) and formal verification framework for Zero-Knowledge (ZK) circuits using Lean4. The project aims to enhance the correctness…
-
Hacker News: Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions
Source URL: https://cacm.acm.org/practice/questioning-the-criteria-for-evaluating-non-cryptographic-hash-functions/ Source: Hacker News Title: Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides an in-depth examination of both cryptographic and non-cryptographic hash functions, highlighting their importance in computing practices, security requirements, and performance in various applications. It reveals critical insights into…
-
Hacker News: How to prove false statements? (Part 1)
Source URL: https://blog.cryptographyengineering.com/2025/02/04/how-to-prove-false-statements-part-1/ Source: Hacker News Title: How to prove false statements? (Part 1) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text delves into the implications of theoretical models in cryptography, particularly focusing on the random oracle model (ROM) and its impact on the practical security of cryptographic schemes. It emphasizes the…
-
Hacker News: AMD: Microcode Signature Verification Vulnerability
Source URL: https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w Source: Hacker News Title: AMD: Microcode Signature Verification Vulnerability Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a security vulnerability in AMD Zen-based CPUs identified by Google’s Security Team, which allows local administrator-level attacks on the microcode verification process. This is significant for professionals in infrastructure and hardware…
-
Slashdot: Australia Moves To Drop Some Cryptography By 2030
Source URL: https://it.slashdot.org/story/24/12/18/173242/australia-moves-to-drop-some-cryptography-by-2030?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Australia Moves To Drop Some Cryptography By 2030 Feedly Summary: AI Summary and Description: Yes Summary: Australia’s chief cybersecurity agency, the Australian Signals Directorate (ASD), has recommended that local organizations cease the use of widely utilized cryptographic algorithms due to concerns over quantum computing threats, with an implementation deadline…
-
Hacker News: Compromising OpenWrt Supply Chain
Source URL: https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/ Source: Hacker News Title: Compromising OpenWrt Supply Chain Feedly Summary: Comments AI Summary and Description: Yes Summary: This text presents a comprehensive security analysis regarding vulnerabilities in the OpenWrt firmware supply chain, detailing how command injection and SHA-256 collisions can be exploited. It emphasizes the importance of secure coding practices and robust…