Pre-computed Hash Table, v. 1.0 | Andronicus
Security Advisory 2019-06-13 | Yubico
Attacks that allow retrieving all HSM (Hardware Security Modules) secrets remotely
The Platform Challenge: Balancing Safety, Privacy and Freedom — Alex Stamos (DataEDGE 2019)
Researchers use Rowhammer bit flips to steal 2048-bit crypto key
New Pervasive Worm Exploiting Linux Exim Server Vulnerability
Proving that a Russian cryptographic standard is too structured
Why Are Cryptographers Being Denied Entry into the US?