securityvulnerabilities
Safer
Creating production-quality security defenses that address network interference and ensure safe, reliable global connectivity.
Filter by: AI DDoS DNS SSH SSL Authentication Automation Bots Certificates Cryptography Distributed systems Distributed Systems Encryption Infrastructure Javascript Key Management Malware Measurement Passwords Privacy Protocols Quic Research Security Standards Storage Vulnerabilities
securityDDoSquic
securityjavascript
securityautomation
securitybots
securitycertificates
securitySSH
securityencryption
publication
2025
RFC 9814: Use of the SLH-DSA Signature Algorithm in the Cryptographic Message Syntax (CMS)
cryptographyprotocols
publication
2025
RFC 9881: Algorithm Identifiers for Module-Lattice-Based Digital Signature Algorithm (ML-DSA)
cryptographyprotocols
publication
2025
Efficient intrusion detection via heterogeneous graph attention networks and parallel provenance analysis
securityAIstorage
securityDNS
securitySSL
publication
2024
X-Wing: The Hybrid KEM You've Been Looking For
cryptographyprotocols
securitykey-management
publication
2023
Security Analysis of Signature Schemes with Key Blinding
cryptographyprotocols
publication
2023
RFC 9380: Hashing to Elliptic Curves
cryptographyprotocols
authenticationsecurityprivacy
publication
2023
Portunus: Re-imagining access control in distributed systems
distributed systemscryptography
publication
2023
Portunus: Re-imagining access control in distributed systems using attribute-based encryption
distributed-systemscryptography
publication
2023
Global, Passive Detection of Connection Tampering
measurement
privacysecurityprotocols
securitySSL
blog
2022
Hertzbleed explained
securityvulnerabilities
blog
2022
Future-proofing SaltStack
securityinfrastructure
publication
2022
RFC 9180: Hybrid Public Key Encryption
cryptographyprotocols
publication
2022
Gossamer: Securely Measuring Password-based Logins
authenticationsecurityprivacy
publication
2022
A tale of two models: Formal verification of KEMTLS via Tamarin
cryptography
publication
2022
RFC 9257: Guidance for External Pre-Shared Key (PSK) Usage in TLS
securityprivacyprotocols
authenticationsecurityprivacy
publication
2022
RFC 9261: Exported Authenticators in TLS
securityprotocols
publication
2022
Let The Right One In: Attestation as a Usable CAPTCHA Alternative
privacy
blog
2021
Research Directions in Password Security
securitypasswords
securitystandards
blog
2021
Introducing SSL/TLS Recommender
securitySSL
securityresearch
publication
2020
RFC 8937: Randomness Improvements for Security Protocols
cryptographysecurityprotocols
cryptography
publication
2020
RFC 8922: A Survey of the Interaction between Security Protocols and Transport Services
securityprotocols
publication
2019
Strong post-compromise secure proxy re-encryption
cryptography
publication
2019
Protocols for checking compromised credentials
privacycryptography
publication
2018
nQUIC: Noise-based QUIC packet protection
securitycryptography
publication
2018
Geo Key Manager
cryptographyprotocols
publication
2017
Understanding the mirai botnet
malwaremeasurement
publication
2017
The Security Impact of HTTPS Interception
securitymeasurement
publication
2016
Attacking White-Box AES Constructions
cryptography
publication
2015
An analysis of TLS handshake proxying
cryptographyauthentication